The State of Cryptography
Cryptographic library adoption across 11 package ecosystems
NIST Post-Quantum Deadlines
NIST IR 8547 transition deadlines for quantum-vulnerable public-key algorithms
NIST targets deprecation of quantum-vulnerable public-key algorithms (RSA, ECDSA, ECDH, DSA) by this date. Symmetric ciphers (AES) and hash functions (SHA-2, SHA-3) are unaffected.
Quantum-vulnerable public-key algorithms must be fully replaced. Symmetric crypto (AES-128/256) and hash functions remain approved.
Algorithms with known cryptanalytic breaks (MD5, SHA-1, DES, RC4, Blowfish) or unmaintained implementations with known CVEs. These should be replaced regardless of quantum computing timelines.
e.g. MD5, SHA-1, DES, 3DES, RC4, Blowfish
Actively maintained cryptographic libraries using current-generation algorithms. Includes both quantum-safe symmetric crypto (AES-256, SHA-256, ChaCha20) and quantum-vulnerable asymmetric crypto (RSA, ECDSA, Ed25519). The asymmetric algorithms in this tier are targets for NIST's 2030/2035 PQC transition.
e.g. AES-GCM, SHA-256, ECDSA, Ed25519, Argon2, bcrypt
Implementations of NIST-standardized post-quantum algorithms (ML-KEM, ML-DSA, SLH-DSA) that resist both classical and quantum attacks. These are the replacements for RSA and ECDSA mandated by NIST IR 8547.
e.g. ML-KEM (Kyber), ML-DSA (Dilithium), SLH-DSA (SPHINCS+)
Note: The "Modern" tier includes both quantum-safe symmetric crypto (AES-256, SHA-256) and quantum-vulnerable asymmetric crypto (RSA, ECDSA). The NIST 2030/2035 deadlines apply only to the asymmetric algorithms. Symmetric crypto and hashes remain approved beyond 2035.
Crypto Health by Ecosystem
Of 108.1K packages using cryptography (from 2,809,479 analyzed), here is where they stand by package count - click an ecosystem for details
PQC Adoption Projection(measured: March 2026)
Dashed lines = mathematical estimates from a single snapshot. Solid dot = actual measurement. PQC adoption plotted on right axis (different scale) due to early-stage adoption levels. Historical trend data collection begins March 2026. Future census runs will add real data points.
Download volume by cryptographic tier - click a segment for details
PQC Migration Projection
Projected PQC adoption using logistic S-curve model (Bass diffusion) with NIST deadline markers
Projections use a logistic growth model (S-curve), standard for technology adoption forecasting (Bass, 1969). Unlike compound growth models which imply unbounded exponential expansion, S-curves model realistic adoption with an inflection point and saturation ceiling. Actual adoption will depend on regulatory mandates, tooling maturity, and industry coordination.
Migration Paths
Weak packages paired with recommended replacements, sorted by migration gap - click for details
Ecosystem Breakdown
Cryptographic library adoption by download volume across 10 ecosystems - hover slices, click for packages
Ecosystem Readiness Radar
Modern + PQC adoption percentage across all 10 ecosystems
Top Packages by Downloads
Click a bar for details - filter by tier
Project Crypto Exposure
Which popular open source projects depend on weak cryptography?
Dependency analysis detected cryptographic usage in 108,145 packages. Deep source-level scanning (cryptoserve scan) on a sample of 20 top projects found 4x more crypto patterns -- including stdlib calls, algorithm constants, and TLS configurations invisible to dependency matching.
| Project | Downloads/mo | Posture | Crypto DepsWeak / Modern / PQC | |
|---|---|---|---|---|
react npm | 62.0M | No Crypto | > | |
lodash npm | 52.0M | No Crypto | > | |
axios npm | 48.2M | No Crypto | > | |
requests PyPI | 42.0M | Modern | 1M | > |
express npm | 34.2M | Weak | 2W | > |
webpack npm | 28.4M | Mixed | 1W | > |
next npm | 22.1M | Modern | 2M | > |
spring-boot Maven Central | 18.4M | Mixed | 1W1M | > |
jsonwebtoken npm | 18.4M | Mixed | 1W1M | > |
django PyPI | 12.8M | Modern | 2M | > |
tokio-rs/tokio crates.io | 12.6M | No Crypto | > | |
fastapi PyPI | 9.2M | Modern | 2M | > |
flask PyPI | 8.4M | Modern | 1M | > |
hyper-rs/hyper crates.io | 8.2M | Modern | 2M | > |
apache/kafka Maven Central | 6.8M | Mixed | 1W1M | > |
laravel/framework Packagist | 6.2M | Modern | 2M | > |
gin-gonic/gin Go Modules | 4.2M | Mixed | 1W1M | > |
actix/actix-web crates.io | 3.4M | Modern | 2M | > |
IdentityServer4 NuGet | 3.4M | Modern | 2M | > |
symfony/security-bundle Packagist | 2.8M | Mixed | 1W1M | > |
Research Insights
Analytical findings and PQC readiness assessment - click findings for details
PQC adoption critically low before NIST deadline
Post-quantum cryptography accounts for only 0.0500% of tracked downloads, with 1,386 days remaining until the NIST 2030 deprecation deadline. At current adoption rates, the ecosystem is not on track for a timely transition.
NIST 2030 PQC migration deadline
1,386 days (3 yrs, 291 days) remain until NIST targets deprecation of RSA, ECDSA, and other quantum-vulnerable algorithms. Organizations should have migration plans finalized and implementation underway well before this date to account for testing and validation cycles.
Annual supply chain exposure to weak cryptography
Extrapolating monthly weak crypto downloads to annual: ~12.1B package installations per year incorporate deprecated cryptographic primitives (MD5, SHA-1, DES, RC4, unmaintained libraries). Note: download counts include CI/CD and transitive dependencies and may overstate direct application usage.
Weak-to-PQC download ratio
For every 1 post-quantum crypto download, there are 401 downloads of weak/deprecated cryptographic packages. Note: PQC replaces quantum-vulnerable public-key algorithms (RSA, ECDSA), not symmetric crypto or hashes. This ratio indicates how far behind PQC adoption trails legacy usage.
Downloads using deprecated cryptography
19.8% of all tracked cryptographic package downloads (1.0B/month) rely on weak or deprecated algorithms including MD5, SHA-1, DES, RC4, and unmaintained libraries.
Security advisory severity distribution
Of 87 crypto-related GitHub advisories: 12 critical (13.8%), 31 high (35.6%), 28 medium, 16 low. Critical and high severity advisories require immediate attention in dependency audits.
Single package concentration in weak crypto
rsa accounts for 39.9% of all weak crypto downloads (403.3M/month). Migrating this single dependency away from deprecated algorithms would substantially reduce ecosystem exposure.
npm has higher weak crypto usage than PyPI
npm weak crypto: 30.3% of downloads. PyPI weak crypto: 17.4% of downloads. npm shows a higher concentration of deprecated cryptographic libraries, indicating a greater need for migration tooling and awareness in that ecosystem.
Cryptographic CVE density across ecosystems
761 crypto-related CVEs mapped across 5.1B monthly downloads yields a density of 0.15 CVEs per million downloads. Each vulnerability in a widely-used package multiplies exposure across dependent applications.
Leading modern cryptography package
cryptography leads modern crypto adoption with 849.1M/month (20.7% of modern tier). Modern packages provide audited, constant-time implementations but still require future PQC migration for quantum-vulnerable algorithms like ECDSA and RSA.
Quantum Threat & Migration
Algorithm vulnerability timeline, PQC implementation availability, and recommended actions
Vulnerability Landscape
Click rows and bars for detailed breakdowns
| CWE | Description | Count | |
|---|---|---|---|
| CWE-327 | Use of a Broken or Risky Cryptographic Algorithm | 419 | |
| CWE-326 | Inadequate Encryption Strength | 339 | |
| CWE-328 | Use of Weak Hash | 3 |
Click a row for details
Click an arc or badge for details
HTML: Self-contained report with Chart.js visualizations | JSON: Raw data via API (CORS-enabled)
Full scan dataset for independent verification. 2.8M packages across 11 ecosystems.
Find Weak Crypto in Your Code
CryptoServe scans your codebase for vulnerable cryptographic implementations and generates a migration plan
View on GitHub