Quantum Crafts

Discover, Prioritize, and Fix Quantum‑Vulnerable Cryptography

before the clock runs out.

PQC Scanner inventories cryptography across endpoints, code and configs; maps gaps to CNSA 2.0 (ML‑KEM‑1024, ML‑DSA‑87, SHA‑384/512, LMS/XMSS); and gives you step‑by‑step playbooks to migrate safely.

View Live Demo

Capabilities

Everything you need to get PQC‑ready

Environment Discovery

Audit TLS endpoints, APIs, VPNs, containers, OS images. Detect OpenSSL 3.x & OQS provider registration. Flag legacy RSA/ECC and weak params automatically.

Compliance Mapping

Align with CNSA 2.0, FIPS 203/204, NIST SP 800‑208. Deadline tags and impact scoring for each finding. Executive report + technical backlog.

Guided Remediation

Playbooks for TLS, IPsec, boot chain, PKI, code signing. Hybrid guidance where protocols require it. Validated parameter sets and config snippets.

Integrations Next Version

GitHub Actions, GitLab CI, Terraform Cloud. Kubernetes/Helm, ingress controllers, service mesh. SIEM export (JSON), PDF reports, ticketing hooks.

Checks & Signals

OpenSSL/OQS provider, PQC ciphersuites, key sizes. Firmware/UEFI/TPM presence; LMS/XMSS readiness. IPsec/IKEv2, WireGuard, VPN gateways and clients.

Artifacts Next Version

Crypto‑BOM (CBOM) for systems and software. Risk‑prioritized remediation roadmap. Before/after posture snapshots for auditors.

How it Works

1

Discover

Agent & CLI enumerate crypto use, libraries, protocols, and firmware trust roots.

2

Assess

Findings mapped to CNSA 2.0 with risk, dependency, and timeline annotations.

3

Remediate

Apply guided playbooks. Gate builds and infra changes to keep posture green.

Why Now

Regulatory Deadlines

New acquisitions CNSA 2.0‑compliant by 2027. Phase‑out non‑CNSA 2.0 by 2030; mandate by 2031. Reporting continues until all components are QR.

Harvest‑Now‑Decrypt‑Later

Data stolen today can be decrypted once CRQC arrives. Firmware roots of trust are long‑lived—act early. Crypto‑agility now avoids costly retrofits later.