New: Post-Quantum Cryptography tools — is your domain quantum-safe? Check now
NIST FIPS 203/204/205 Post-Quantum SSL/TLS Analysis

Post-Quantum Certificate Validator

Analyze SSL/TLS certificates against quantum threats. Detect vulnerable algorithms and get a PQC migration roadmap.

LightningLightning bolt icon Quantum Threat Timeline

"Harvest Now, Decrypt Later" — adversaries collect encrypted data today to decrypt once quantum computers mature.

2024
5%
Small quantum computers exist — no real threat yet
2026
20%
Quantum advantage demonstrated in specific problems
2028
45%
IBM/Google target: 100,000+ qubit machines
2030
70%
Cryptographically Relevant Quantum Computer possible
2035
90%
RSA/ECC likely broken — PQC migration must be complete

Algorithm Security Comparison

RSA-2048 Classical
35
RSA-4096 Classical
50
ECDSA-256 Classical
45
ECDSA-384 Classical
52
Kyber-1024 CheckmarkAnimated checkmark icon Post-Quantum
95
Dilithium-5 CheckmarkAnimated checkmark icon Post-Quantum
95
SPHINCS+-256 CheckmarkAnimated checkmark icon Post-Quantum
92

NIST Post-Quantum Standards (August 2024)

FIPS 203
ML-KEM
(CRYSTALS-Kyber)
Key Encapsulation
Use: TLS, VPN, Key Exchange
Fast Small keys Quantum-Safe
FIPS 204
ML-DSA
(CRYSTALS-Dilithium)
Digital Signature
Use: Certificates, Code Signing
Balanced Medium keys Quantum-Safe
FIPS 205
SLH-DSA
(SPHINCS+)
Hash-based Signature
Use: Long-term security, Backup
Conservative Larger keys Quantum-Safe

Validate Your Certificate

PQC Migration Roadmap

Audit
Inventory all cryptographic assets: certs, keys, protocols
Prioritize
Rank systems by risk: long-lived data first, internet-facing second
Test
Deploy PQC in hybrid mode (classical + PQC) in staging environment
Migrate
Roll out Kyber/Dilithium to production, update CAs and TLS configs
Monitor
Continuously audit, track NIST updates, plan next-gen rotation

Quick Reference

What is "Harvest Now, Decrypt Later"?
Adversaries store encrypted traffic today to decrypt once a powerful quantum computer exists. Data with long confidentiality requirements (state secrets, medical records, financial data) is at risk right now.
What is a Cryptographically Relevant Quantum Computer (CRQC)?
A CRQC can break RSA-2048 or ECC-256 within hours using Shor's algorithm. Estimates suggest this may be achievable between 2030–2035 with millions of stable qubits.
What is Hybrid Mode?
Hybrid mode combines a classical algorithm (e.g., ECDHE) with a PQC algorithm (e.g., Kyber) in the same TLS handshake. If either algorithm holds, the session is secure — recommended during migration.
Which NIST standard should I use first?
TLS/key exchange: ML-KEM (FIPS 203 / Kyber). Digital signatures and certificates: ML-DSA (FIPS 204 / Dilithium). Long-term security backup: SLH-DSA (FIPS 205 / SPHINCS+).