Post-Quantum Readiness Checker

Test your browser's support for post-quantum cryptography (PQC). Check WebCrypto API capabilities, TLS algorithm support, and get a quantum-readiness score. All tests run locally in your browser.

Ad Space

What Is Post-Quantum Cryptography?

Post-quantum cryptography (PQC) refers to cryptographic algorithms that are resistant to attacks by quantum computers. Current encryption standards like RSA and elliptic curve cryptography (ECC) could be broken by a sufficiently powerful quantum computer using Shor's algorithm. NIST finalized its first PQC standards in 2024: ML-KEM (Kyber) for key encapsulation, ML-DSA (Dilithium) for digital signatures, and SLH-DSA (SPHINCS+) for stateless hash-based signatures.

This tool checks whether your browser and its WebCrypto implementation support these new algorithms, and assesses your overall readiness for the post-quantum transition.

Why Post-Quantum Readiness Matters Now

The threat is not just future — it is present. Nation-state actors are conducting "harvest now, decrypt later" attacks, intercepting encrypted data today to decrypt it once quantum computers become powerful enough. Sensitive data with long shelf lives (medical records, financial data, state secrets, intellectual property) is at immediate risk. Wavestone reports that organizations should begin cryptographic inventory and migration planning now, even before quantum computers reach cryptographic relevance.

Chrome 124+ and other Chromium browsers already support ML-KEM (Kyber) in TLS 1.3 handshakes, making post-quantum key exchange available today. This tool checks if your browser is among them.

The NIST PQC Standards

NIST selected four primary algorithms after an 8-year evaluation: ML-KEM (formerly CRYSTALS-Kyber) for key encapsulation, ML-DSA (formerly CRYSTALS-Dilithium) for digital signatures, SLH-DSA (formerly SPHINCS+) as a conservative signature backup, and FN-DSA (formerly FALCON) for size-optimized signatures. These algorithms are based on lattice problems and hash functions that are believed to resist both classical and quantum attacks.

How to Prepare for Post-Quantum

Start with a cryptographic inventory — identify every system, protocol, and certificate that uses RSA, ECC, or DH key exchange. Prioritize systems handling long-lived sensitive data. Test hybrid PQC modes (classical + PQC) in non-production environments. Update TLS libraries to versions supporting ML-KEM. Plan certificate and key rotation timelines. The transition will take years — starting now gives you time to test, validate, and roll out changes incrementally rather than in a crisis.