Assess cryptographic systems for quantum computing threats and plan migration to post-quantum cryptography.
Prepare your systems for the quantum computing era before current cryptography becomes vulnerable.
- Quantum Threat Assessment: Analyze algorithms against quantum computing threats
- Algorithm Database: Known algorithms with quantum resistance status
- Migration Planning: Generate actionable migration plans
- Timeline Analysis: Understand quantum threat timeline
- Compliance Checking: Check quantum security compliance
- Risk Scoring: Calculate quantum risk scores
git clone https://github.com/hallucinaut/quantumsec.git
cd quantumsec
go build -o quantumsec ./cmd/quantumsec
sudo mv quantumsec /usr/local/bin/go install github.com/hallucinaut/quantumsec/cmd/quantumsec@latest# Assess multiple algorithms
quantumsec assess "RSA-2048,AES-256,SHA-256"
# Full quantum security assessment
quantumsec assess "Kyber-768,Dilithium-2,SHA3-512"# Analyze for quantum threats
quantumsec analyze "RSA-2048,ECC-256"
# Check single algorithm
quantumsec check RSA-4096# Show quantum threat timeline
quantumsec timelinepackage main
import (
"fmt"
"github.com/hallucinaut/quantumsec/pkg/crypto"
)
func main() {
analyzer := crypto.NewAnalyzer()
// Assess algorithms
assessment := analyzer.AssessSecurity([]string{
"RSA-2048",
"AES-256",
"SHA-256",
})
fmt.Printf("Overall Risk: %s\n", assessment.OverallRisk)
fmt.Printf("Compliance: %s\n", assessment.ComplianceStatus)
// Calculate risk score
riskScore := analyzer.CalculateQuantumRisk(assessment)
fmt.Printf("Risk Score: %.0f%%\n", riskScore*100)
// Generate migration plan
plan := analyzer.GenerateMigrationPlan(assessment)
for action, priority := range plan {
fmt.Printf("%s: %s\n", action, priority)
}
}Breaks asymmetric cryptography:
- RSA
- ECC
- Diffie-Hellman
Provides quadratic speedup for:
- Symmetric encryption (AES, ChaCha20)
- Hash functions (SHA-2, SHA-3)
| Algorithm | Type | Key Size | Quantum Threat |
|---|---|---|---|
| Kyber-512 | Asymmetric | 512 | Resistant |
| Kyber-768 | Asymmetric | 768 | Resistant |
| Dilithium-2 | Asymmetric | 2 | Resistant |
| AES-256 | Symmetric | 256 | Safe (Grover) |
| SHA3-512 | Hash | 512 | Resistant |
| Algorithm | Type | Key Size | Quantum Threat |
|---|---|---|---|
| RSA-1024 | Asymmetric | 1024 | ~1000 qubits |
| RSA-2048 | Asymmetric | 2048 | ~4000 qubits |
| ECC-256 | Asymmetric | 256 | ~2300 qubits |
| SHA-1 | Hash | 160 | Collisions found |
| Score | Level | Action |
|---|---|---|
| 0-10% | MINIMAL | Monitor |
| 10-30% | LOW | Plan migration |
| 30-50% | MEDIUM | Prioritize migration |
| 50-70% | HIGH | Urgent migration |
| 70-100% | CRITICAL | Immediate action |
# Run all tests
go test ./...
# Run with coverage
go test -cover ./...
# Run specific test
go test -v ./pkg/crypto -run TestAssessSecurityAssessing quantum security of: [RSA-2048 AES-256 SHA-256]
Assessment Date: 2024-02-25 15:30:00
Overall Risk: HIGH
Compliance: AT_RISK
Algorithm Analysis:
[1] β RSA-2048 (QUANTUM_VULNERABLE)
Threat: Shor's algorithm can break in ~4000 qubits
Recommendation: Plan migration to post-quantum algorithms
[2] β AES-256 (QUANTUM_SECURE)
Threat: Grover's algorithm provides quadratic speedup
Recommendation: Quantum-safe with sufficient margin
[3] β SHA-256 (QUANTUM_SECURE)
Threat: Grover's algorithm provides quadratic speedup
Recommendation: Quantum-safe with sufficient margin
Recommendations:
- Migrate from RSA-2048 to quantum-safe alternative
- Cryptographic Inventory Assessment: Audit all cryptographic algorithms
- Quantum Migration Planning: Plan transition to post-quantum crypto
- Compliance Verification: Ensure quantum security compliance
- Risk Management: Assess quantum risk to systems
- Long-term Data Protection: Protect data for future decryption
- Inventory all cryptographic algorithms in your systems
- Assess quantum risk for each algorithm
- Prioritize migration based on risk scores
- Test post-quantum algorithms before deployment
- Monitor quantum computing progress
- Plan for hybrid crypto during transition
- Protect sensitive data with quantum-safe encryption
quantumsec/
βββ cmd/
β βββ quantumsec/
β βββ main.go # CLI entry point
βββ pkg/
β βββ crypto/
β β βββ crypto.go # Quantum crypto analysis
β β βββ crypto_test.go # Unit tests
β βββ analyze/
β βββ analyze.go # Security analysis
β βββ analyze_test.go # Unit tests
βββ README.md
MIT License
- NIST Post-Quantum Cryptography Project
- Quantum computing research community
- Cryptography security researchers
Built with GPU by hallucinaut