Scan your TLS, code repos, cloud infra, and certificates for cryptographic vulnerabilities that will break when quantum computers arrive. Get your Quantum Readiness Score.
NIST finalized post-quantum standards in August 2024 (FIPS 203/204/205). The migration clock is ticking.
Weighted composite of TLS (25%), code (25%), cloud (20%), certificates (20%), key management (10%). Bonus points for PQC adoption.
Cipher suites, protocol versions, key exchange algorithms, HSTS. Detects RSA, weak DH, missing TLS 1.3, and PQC hybrid KEX.
Scan GitHub repos for RSA/ECC usage, weak hashes (MD5/SHA-1), small key sizes, private keys in code. Python, JS, Go, Java, C/C++, Rust.
AWS ACM certificates, KMS key algorithms, CloudFront TLS policies, ELB SSL policies, S3 encryption. GCP and Azure coming soon.
Full chain analysis: key sizes, algorithms, expiry, self-signed detection, harvest-now-decrypt-later risk for long-lived certs.
Post-quantum key exchange. Replaces ECDH/DH. Based on Kyber lattice scheme.
Post-quantum digital signatures. Replaces RSA/ECDSA. Based on Dilithium lattice scheme.
Hash-based digital signatures. Backup standard. Based on SPHINCS+.
NIST migration guidance. Recommends 3-phase transition: inventory, assess, migrate.
Your PDF report includes: executive summary, per-finding remediation steps with NIST references, QRS score breakdown by category, NIST IR 8547 migration roadmap, compliance gap analysis, and a quantum-attested seal for auditor verification.
Share with your CISO or compliance team — no account required to verify the attestation.