The State of Cryptography
Real-time analysis of cryptographic library adoption across 11 package ecosystems
NIST Post-Quantum Deadlines
NIST IR 8547 transition deadlines for quantum-vulnerable public-key algorithms
NIST targets deprecation of quantum-vulnerable public-key algorithms (RSA, ECDSA, ECDH, DSA) by this date. Symmetric ciphers (AES) and hash functions (SHA-2, SHA-3) are unaffected.
Quantum-vulnerable public-key algorithms must be fully replaced. Symmetric crypto (AES-128/256) and hash functions remain approved.
Algorithms with known cryptanalytic breaks (MD5, SHA-1, DES, RC4, Blowfish) or unmaintained implementations with known CVEs. These should be replaced regardless of quantum computing timelines.
e.g. MD5, SHA-1, DES, 3DES, RC4, Blowfish
Actively maintained cryptographic libraries using current-generation algorithms. Includes both quantum-safe symmetric crypto (AES-256, SHA-256, ChaCha20) and quantum-vulnerable asymmetric crypto (RSA, ECDSA, Ed25519). The asymmetric algorithms in this tier are targets for NIST's 2030/2035 PQC transition.
e.g. AES-GCM, SHA-256, ECDSA, Ed25519, Argon2, bcrypt
Implementations of NIST-standardized post-quantum algorithms (ML-KEM, ML-DSA, SLH-DSA) that resist both classical and quantum attacks. These are the replacements for RSA and ECDSA mandated by NIST IR 8547.
e.g. ML-KEM (Kyber), ML-DSA (Dilithium), SLH-DSA (SPHINCS+)
Note: The "Modern" tier includes both quantum-safe symmetric crypto (AES-256, SHA-256) and quantum-vulnerable asymmetric crypto (RSA, ECDSA). The NIST 2030/2035 deadlines apply only to the asymmetric algorithms. Symmetric crypto and hashes remain approved beyond 2035.
Crypto Health by Ecosystem
Of 57.9K projects using cryptography, here is where they stand today - click an ecosystem for details
Download volume by cryptographic tier - click a segment for details
PQC Migration Projection
Projected PQC adoption under three growth scenarios with NIST deadline markers
Migration Paths
Weak packages paired with recommended replacements, sorted by migration gap - click for details
Ecosystem Breakdown
Cryptographic library adoption across 11 ecosystems - hover slices, click for packages
Ecosystem Readiness Radar
Modern + PQC adoption percentage across all 11 ecosystems
Top Packages by Downloads
Click a bar for details - filter by tier
Project Crypto Exposure
Which popular open source projects depend on weak cryptography?
| Project | Downloads/mo | Posture | Crypto DepsWeak / Modern / PQC | |
|---|---|---|---|---|
react npm | 62.0M | No Crypto | > | |
lodash npm | 52.0M | No Crypto | > | |
axios npm | 48.2M | No Crypto | > | |
requests PyPI | 42.0M | Modern | 1M | > |
express npm | 34.2M | Weak | 2W | > |
webpack npm | 28.4M | Mixed | 1W | > |
next npm | 22.1M | Modern | 2M | > |
spring-boot Maven Central | 18.4M | Mixed | 1W1M | > |
jsonwebtoken npm | 18.4M | Mixed | 1W1M | > |
django PyPI | 12.8M | Modern | 2M | > |
tokio-rs/tokio crates.io | 12.6M | No Crypto | > | |
fastapi PyPI | 9.2M | Modern | 2M | > |
flask PyPI | 8.4M | Modern | 1M | > |
hyper-rs/hyper crates.io | 8.2M | Modern | 2M | > |
apache/kafka Maven Central | 6.8M | Mixed | 1W1M | > |
laravel/framework Packagist | 6.2M | Modern | 2M | > |
gin-gonic/gin Go Modules | 4.2M | Mixed | 1W1M | > |
actix/actix-web crates.io | 3.4M | Modern | 2M | > |
IdentityServer4 NuGet | 3.4M | Modern | 2M | > |
symfony/security-bundle Packagist | 2.8M | Mixed | 1W1M | > |
Research Insights
Analytical findings and PQC readiness assessment - click findings for details
Downloads using deprecated cryptography
36.1% of all tracked cryptographic package downloads (148.9M/month) rely on weak or deprecated algorithms including MD5, SHA-1, DES, RC4, and unmaintained libraries.
NIST 2030 PQC migration deadline
1,411 days (3 yrs, 316 days) remain until NIST targets deprecation of RSA, ECDSA, and other quantum-vulnerable algorithms. Organizations should have migration plans finalized and implementation underway well before this date to account for testing and validation cycles.
Annual supply chain exposure to weak cryptography
Extrapolating monthly weak crypto downloads to annual: ~1.8B package installations per year incorporate deprecated cryptographic primitives (MD5, SHA-1, DES, RC4, unmaintained libraries). Note: download counts include CI/CD and transitive dependencies and may overstate direct application usage.
Weak-to-PQC download ratio
For every 1 post-quantum crypto download, there are 271 downloads of weak/deprecated cryptographic packages. Note: PQC replaces quantum-vulnerable public-key algorithms (RSA, ECDSA), not symmetric crypto or hashes. This ratio indicates how far behind PQC adoption trails legacy usage.
PQC adoption critically low before NIST deadline
Post-quantum cryptography accounts for only 0.1300% of tracked downloads, with 1,411 days remaining until the NIST 2030 deprecation deadline. At current adoption rates, the ecosystem is not on track for a timely transition.
Cryptographic CVE density across ecosystems
4,892 crypto-related CVEs mapped across 412.7M monthly downloads yields a density of 11.85 CVEs per million downloads. Each vulnerability in a widely-used package multiplies exposure across dependent applications.
Security advisory severity distribution
Of 87 crypto-related GitHub advisories: 12 critical (13.8%), 31 high (35.6%), 28 medium, 16 low. Critical and high severity advisories require immediate attention in dependency audits.
Single package concentration in weak crypto
commons-codec:commons-codec accounts for 21.6% of all weak crypto downloads (32.1M/month). Migrating this single dependency away from deprecated algorithms would substantially reduce ecosystem exposure.
npm has higher weak crypto usage than PyPI
npm weak crypto: 57.1% of downloads. PyPI weak crypto: 56.2% of downloads. npm shows a higher concentration of deprecated cryptographic libraries, indicating a greater need for migration tooling and awareness in that ecosystem.
Leading modern cryptography package
golang.org/x/crypto leads modern crypto adoption with 45.2M/month (17.2% of modern tier). Modern packages provide audited, constant-time implementations but still require future PQC migration for quantum-vulnerable algorithms like ECDSA and RSA.
Quantum Threat & Migration
Algorithm vulnerability timeline, PQC implementation availability, and recommended actions
Vulnerability Landscape
Click rows and bars for detailed breakdowns
| CWE | Description | Count | |
|---|---|---|---|
| CWE-327 | Use of a Broken or Risky Cryptographic Algorithm | 2,841 | |
| CWE-326 | Inadequate Encryption Strength | 1,523 | |
| CWE-328 | Use of Weak Hash | 528 |
Click a row for details
Click an arc or badge for details
HTML: Self-contained report with Chart.js visualizations | JSON: Raw data for researchers (CORS-enabled API)
Find Weak Crypto in Your Code
CryptoServe scans your codebase for vulnerable cryptographic implementations and generates a migration plan
View on GitHub