QubitAC • Adaptive Cryptography

Crypto that can change, without breaking everything.

Post-quantum cryptography is coming. The hardest part isn’t picking an algorithm — it’s evolving real systems safely. QubitAC is a simple framework and toolkit for discovery, criticality, and migration toward PQC.

Free & open source. Runs locally. No data leaves your machine.

What is Adaptive Cryptography?

Applied cryptography is about doing crypto correctly today. Adaptive cryptography is about ensuring you can change cryptography tomorrow — safely, measurably, and with proof.

That's the PQC challenge: not just picking algorithms, but building systems where crypto can evolve without breaking everything.

qubitac — adaptive cryptography

Why QubitAC

Quantum computers will break the cryptography protecting your data. The question isn't if — it's whether you'll be ready when it happens.

Why now

Adversaries are already harvesting encrypted data today to decrypt it once quantum computers are powerful enough — this is called Harvest Now, Decrypt Later. Every day your endpoints run vulnerable cryptography is another day your sensitive data is being collected for future decryption. NIST has finalized post-quantum standards. Federal mandates require migration plans. The 2030 deadline for deprecated algorithms is approaching. The window to act is closing.

NIST finalized ML-KEM, ML-DSA, and SLH-DSA — post-quantum standards are ready
NSM-10 and OMB M-23-02 require crypto inventories and migration plans
Harvest Now, Decrypt Later means your data is at risk today, not just tomorrow
PQC Assessment
Key Exchange
X25519 — quantum vulnerable
Shor's
Certificate Signature
ECDSA-SHA256 — quantum vulnerable
Shor's
Hybrid Key Exchange
X25519MLKEM768 — quantum safe
ML-KEM
CRITICAL
3 vulnerabilities
LOW
PQC hybrid active

How AC Scanner protects you

You can't secure what you can't see. Most organizations have no idea what cryptography their endpoints are running — which certificates are expiring, which key exchanges are vulnerable, or which services still use deprecated TLS. QubitAC Scanner maps your entire cryptographic surface in minutes and shows you exactly where you're exposed, so you can fix it before it's exploited.

Scans TLS, SSH, certificates, key exchanges, and cipher suites in one pass
Generates a Cryptographic Bill of Materials — your full crypto inventory
Runs locally — free, open source, no data leaves your machine
Scan Results
api.example.com:443
TLS 1.3 · TLS_AES_256_GCM_SHA384
success
legacy.example.com:443
TLS 1.2 · missing cert dates
partial
internal.example.com:8080
Port open · no TLS
no_tls
cdn.example.com:443
TLS 1.3 · X25519MLKEM768
PQC ✓

From blind spot to full picture

QubitAC doesn't just find problems — it gives you the complete picture. Upload your CBOM to the dashboard and see your entire cryptographic posture: how many endpoints are PQC-ready, which are still vulnerable, and exactly where to focus your migration effort. Share the results with auditors, CISOs, and engineering leads.

Interactive dashboard with PQC readiness score across your infrastructure
Every finding ranked by migration priority — critical, high, medium, low
Export CBOM for NIST and PCI-DSS compliance — audit-ready from day one
Dashboard
Endpoints
1,247
PQC Ready
23%
TLS 1.3
78%
TLS 1.2
19%
TLS 1.0/1.1
3%
Scan Your Endpoints → Why PQC