Workshop Description
For OT security engineers, SCADA architects, and energy infrastructure teams. Covers protocol-specific PQC migration for DNP3 Secure Authentication, IEC 61850 GOOSE/MMS, Modbus/TCP, and OPC UA. Addresses constrained device migration for RTUs, PLCs, and IEDs with limited compute resources, IEC 62351 and NERC CIP compliance mapping, NIST FIPS 203/204/205/206 algorithm selection criteria, and supply chain vendor readiness assessment.
Operational technology networks in the energy sector present migration challenges that IT-focused PQC programmes do not address. Asset lifecycles of 15-30 years mean that RTUs and PLCs deployed today will still be operating when cryptographically relevant quantum computers arrive. Constrained compute environments (ARM Cortex-M class processors with 256 KB RAM) cannot simply adopt ML-KEM-1024 without architectural changes. Proprietary protocols lack standard PQC integration paths. Safety-critical uptime requirements (99.999%) eliminate the option of fleet-wide firmware upgrades during a single maintenance window. This workshop provides a structured migration methodology that accounts for these constraints: protocol-by-protocol cryptographic inventory, device-by-device capability assessment, and a phased migration sequence that maintains operational continuity throughout the transition.
What participants cover
- Protocol-level cryptographic exposure: RSA/ECDSA/HMAC dependencies in DNP3 SA, IEC 61850 GOOSE/MMS, Modbus/TCP, and OPC UA, with quantum threat timelines for each
- NIST FIPS 203/204/205/206 algorithm selection: ML-KEM key sizes, ML-DSA signature overhead, SLH-DSA as stateless hash-based fallback, and FN-DSA for bandwidth-constrained links
- Constrained device migration: memory footprint and CPU cycle requirements for PQC on ARM Cortex-M class processors, gateway-based termination architectures, and hybrid X25519+ML-KEM transition schemes
- IEC 62351 compliance mapping: where PQC algorithms integrate into Parts 3-6 (TLS for MMS, GOOSE/SV authentication) and gap analysis methodology
- NERC CIP alignment: CIP-005 electronic security perimeter, CIP-007 system hardening, and CIP-013 supply chain obligations for PQC procurement
- Vendor readiness and CBOM: assessing SCADA/DCS vendor PQC roadmaps, building a Cryptographic Bill of Materials, and incorporating PQC into firmware update contracts