Services assigned the correct migration path.
Hardware-constrained learning for quantum computing and artificial intelligence
Simulation studio
A twelve-service infrastructure is triaged under escalating quantum threat, forcing the learner to decide which cryptographic assets actually require migration.
Services using RSA-2048, ECC-256, AES-128, and AES-256 are examined under time pressure so the learner separates urgent migration from good operational hygiene.
Critical correction applied: AES-256 does not require PQC migration. AES-128 is upgraded to AES-256 as hygiene, while RSA-2048 maps to ML-KEM, ECC-256 to ML-DSA, and signature systems to SLH-DSA under the relevant FIPS standards.
Module context
Module 5 simulations translate the course into deployment realism: solver tradeoffs, migration strategy, vertical prioritization, and time-horizon judgment.
Live lab
This studio route isolates a single simulation so the learner can focus on one model, one control surface, and one explanatory framing at a time.
Browser-playable lab
Separate true public-key migration urgency from symmetric-key hygiene so the learner does not absorb the wrong cryptographic lesson.
Controls
Key encapsulation is the urgent migration path for RSA transport security.
Elliptic-curve signatures require PQ signature replacement.
AES-256 is already quantum-resistant at the currently taught threat model.
Transport keys remain vulnerable to Shor-style public-key attacks.
Signature systems need a PQ signature path, not a symmetric-key change.
This is a symmetric-key hygiene upgrade, not a PQC swap.
Signature-backed federation must leave ECC for a PQ signature scheme.
No PQ migration is required for the symmetric cipher itself.
Key exchange still depends on vulnerable public-key material.
This is a symmetric-key hygiene upgrade, not a PQC swap.
Certificate signatures need PQ-safe signing primitives.
The risk is in ECC signing, not the symmetric payload cipher.
Outputs
Services assigned the correct migration path.
Vulnerable public-key or signature services still untreated.
Threat rises when vulnerable public-key systems remain.
AES-256 should remain in place. AES-128 upgrades to AES-256 as hygiene. The true PQC migration work targets RSA, ECC, and signature systems.
Why this lab matters
Post-Quantum Cryptography Migration Simulator sits inside Module 5to reinforce the module's core teaching objective through direct manipulation rather than summary-only reading.
Module 5 simulations translate the course into deployment realism: solver tradeoffs, migration strategy, vertical prioritization, and time-horizon judgment.
Keep exploring