Post-Quantum Risk Scanner — a static analysis tool that inventories cryptographic usage in software systems and evaluates the associated risk under post-quantum threat models.
- Scans files (PEM certificates, TLS/SSH configs, source code) for cryptographic primitives
- Classifies each primitive as
quantum-unsafe,quantum-weakened, orquantum-safe - Explains the quantum impact using Shor's and Grover's algorithm analysis
- Recommends post-quantum migration paths aligned with NIST standards
- Not a vulnerability scanner or penetration testing tool
- Not a compliance assessment platform
- Not a real-time security monitoring system
- Does not predict quantum computing timelines
pip install -r requirements.txtpython cli.py scan path/to/certificate.pempython cli.py scan path/to/configs/python cli.py scan path/to/project/ -vpython cli.py scan path/to/project/ --output-format markdown --output-file report.md| Input Type | Examples |
|---|---|
| PEM files | .pem, .crt, .cer, .key |
| Config files | nginx.conf, sshd_config, .conf |
| Source code | .py, .java, .js, .ts, .go, .rs, .c, .cpp |
Input → Scanner Layer → Analysis Layer → Quantum Reasoning → Reporting
- Scanner Layer: Detects cryptographic primitives (factual inventory)
- Analysis Layer: Risk classification + migration advice
- Quantum Reasoning: Shor's and Grover's algorithm impact explanations
- Reporting: Console (colored) or Markdown output
See ARCHITECTURE.md for full design details.
| Category | Meaning |
|---|---|
| 🔴 quantum-unsafe | Broken by quantum computer (Shor's algorithm) |
| 🟡 quantum-weakened | Security reduced by Grover's algorithm |
| 🟢 quantum-safe | Adequate post-quantum security |
This project is for educational and analytical purposes.