QUANTRAMA provides an automated quantum transition readiness assessment based on live TLS analysis and NIST post-quantum cryptography guidance. Here is exactly how it works — including where it may be incomplete.
Important: QUANTRAMA is a triage and prioritization tool, not a certification authority. Our scores indicate estimated quantum migration exposure based on publicly observable cryptographic configuration and current NIST guidance. They do not constitute a compliance certification, a guarantee of security, or a prediction of when quantum computers will break specific algorithms. Use our results alongside professional security review for compliance decisions.
We perform a real TLS handshake with your domain and inspect the cryptographic parameters negotiated by the server. This is the same handshake any browser or client performs — non-intrusive and zero-impact on your servers.
Your quantum readiness score is 0-100, where 100 means no quantum-vulnerable configurations detected. The exact formula:
score = 100 - ((critical × 40 + high × 25 + medium × 15 + low × 10) / max(totalFindings, 1))These weights are modeling decisions, not empirically derived constants. We chose them to reflect relative migration urgency based on NIST transition planning guidance. They may be adjusted as the post-quantum landscape evolves.
Severity reflects migration urgency — how exposed the configuration is and how quickly it should be addressed in a quantum transition plan:
We assess alignment with the NIST post-quantum cryptography standards finalized in 2024:
We also map findings to 9 additional compliance frameworks (HIPAA, PCI-DSS, GDPR, SOC2, CMMC, and more). These mappings are directional — they indicate where quantum cryptographic exposure intersects with framework requirements for encryption in transit, but they are not authoritative compliance assessments.
Instead of predicting when quantum computers will break specific algorithms (which nobody can reliably do), we classify findings by migration urgency:
Immediate
Already deprecated or broken (SSLv3, MD5, expired certs). Fix regardless of quantum timeline.
Urgent
Below NIST minimum key sizes. Vulnerable to classical and quantum attacks.
High priority
Vulnerable to Shor's algorithm on a CRQC. No forward secrecy or harvest-now-decrypt-later exposure.
Strategic
Currently secure against classical computers but will require migration per NIST PQC transition guidance. Plan and budget.
Low priority
Adequate effective security margin even under quantum threat models (e.g., SHA-256 under Grover's algorithm).
We believe transparency about limitations builds more trust than claiming completeness. Here is what our scan does not cover:
Scan any domain and see exactly how the score breaks down — every finding is listed with its severity, explanation, and recommended action.
Scan a Domain — Free