Cryptographic inventory
We map every cryptographic dependency across systems — protocols, libraries, hardware modules — and classify by quantum exposure (harvest-now-decrypt-later vs near-term break risk).
Quantum is a 2026 procurement problem, not a 2030 research curiosity. CFRI helps Canadian regulated firms inventory their cryptographic surface, assess quantum risk, and plan a NIST-aligned post-quantum cryptography migration. We participate in Google's Willow quantum early-access program.
We map every cryptographic dependency across systems — protocols, libraries, hardware modules — and classify by quantum exposure (harvest-now-decrypt-later vs near-term break risk).
ML-KEM, ML-DSA, SLH-DSA, with hybrid-deployment patterns that preserve interoperability through the transition period.
Migration sequencing, key-management changes, vendor coordination, and the timeline that fits inside a Canadian Crown corporation's procurement cadence.
Harvest-now-decrypt-later attacks already capture today's encrypted traffic for future quantum decryption. Long-lived secrets must migrate before quantum capability lands.
NIST FIPS 203 (ML-KEM), 204 (ML-DSA), and 205 (SLH-DSA), plus CCCS guidance for Canadian federal systems.
Yes — we have specific patterns for Crown-corp procurement cadence and CCCS-adjacent security review.
Yes. CFRI's TSB token-standard work includes PQC-compatible signature design.
Yes — see /locations/waterloo. We work with IQC- and Perimeter-adjacent researchers.
Email info@cfri.io with the systems whose cryptographic surface you want inventoried first.
Thirty minutes with operators who have already shipped what you're trying to figure out. CAD-billed. SR&ED-aware.