Not yet. Oracle Database uses TLS with classical key exchange for network connections. Transparent Data Encryption (TDE) uses AES-256 for data at rest (quantum-resistant), but TLS transport is vulnerable to quantum attack.
Key Takeaway: Oracle Database is NOT quantum safe. Scan your Oracle Database infrastructure with QScout. Enable TDE for data at rest protection. Monitor Oracle Critical Patch Updates for PQC announcements. Audit Data Guard, GoldenGate, and SQL*Net configurations.
Oracle Database is NOT fully quantum safe today. **Current State:** Oracle Database uses TLS 1.2 for SQL*Net connections, Oracle Net Services, and Oracle Data Guard replication. TDE encrypts data at rest using AES-256 (quantum-resistant). Oracle Advanced Security uses classical algorithms for network encryption. **PQC Progress:** Oracle has not publicly announced PQC support specific to Oracle Database: - **TDE**: AES-256 encryption is quantum-resistant for data at rest. - **SQL*Net TLS**: Uses classical RSA/ECDH key exchange. - **Oracle Wallet**: Stores X.509 certificates using classical algorithms. - **Java Cryptography (JCE)**: Oracle JDK PQC support will eventually benefit Oracle Database JDBC connections. **HNDL Risk:** Oracle Database instances often contain the most sensitive enterprise data: financial records, customer PII, trade secrets. SQL*Net connections carry this data with classical TLS protection, creating significant HNDL exposure. **What Organizations Should Do:** Audit all Oracle Database connections, Data Guard links, and GoldenGate replication streams. Use QScout to discover all Oracle Database cryptographic dependencies.
| Full Name | Oracle Database (On-Premises and Cloud) |
| Category | database |
| Quantum Vulnerability | Oracle Database TLS (SQL*Net) uses classical key exchange vulnerable to quantum attack. TDE AES-256 encryption is quantum-resistant for data at rest. |
| NIST Status | Oracle has not publicly announced NIST PQC standard adoption timelines for Oracle Database. |
| Deprecation Timeline | Oracle has not published PQC migration timelines for Oracle Database. |
| Replaced By | Oracle Database network encryption will need to migrate to ML-KEM for key exchange |
Scan your Oracle Database infrastructure with QScout. Enable TDE for data at rest protection. Monitor Oracle Critical Patch Updates for PQC announcements. Audit Data Guard, GoldenGate, and SQL*Net configurations.
QScout discovers every instance of Oracle Database across your infrastructure in 7 days — with zero operational disruption. 72-hour time to first findings.