Powered by Axiad Mesh

PQC Readiness Tester

Check if your domain supports Post-Quantum Cryptography

What does this tool do?

It scans your domain to see if your server supports Post-Quantum Cryptography key exchanges (like X25519MLKEM768). Many providers like Cloudflare and AWS now enable this by default. If yours doesn't, a simple software update is often all you need.

This identifies whether PQC-supported key exchange groups are negotiated during the TLS 1.3 handshake with your server.

Why does PQC matter?

Quantum computers will eventually break today's standard encryption (RSA, ECC). Attackers are already harvesting encrypted data now to decrypt later — known as "harvest now, decrypt later" attacks.

Post-Quantum Cryptography uses algorithms designed to resist quantum attacks. NIST has standardized ML-KEM (formerly Kyber) as the first PQC key encapsulation mechanism. Adopting PQC today protects your data against future quantum threats.

How Axiad Mesh helps

Axiad Mesh provides comprehensive cryptographic element tracking across your enterprise. It correlates identities, certificates, keys, and algorithms to give you full visibility into your cryptographic posture.

With Mesh, you can identify every certificate and key in your organization that needs to be migrated to quantum-safe algorithms — and track your progress toward full PQC compliance.

Learn more about Axiad Mesh →

NIST Post-Quantum Cryptography Standards

The algorithms your infrastructure should be moving toward

ML-KEM (FIPS 203)

Module-Lattice-Based Key-Encapsulation Mechanism. Formerly known as CRYSTALS-Kyber. Used for key exchange in TLS.

Standardized

ML-DSA (FIPS 204)

Module-Lattice-Based Digital Signature Algorithm. Formerly known as CRYSTALS-Dilithium. Used for digital signatures.

Standardized

SLH-DSA (FIPS 205)

Stateless Hash-Based Digital Signature Algorithm. Formerly known as SPHINCS+. A hash-based signature alternative.

Standardized