About CheckPQC

CheckPQC is a free, open-methodology post-quantum TLS scanner from Aegyrix LLC. It exists because "is my server PQC-ready?" should not require digging through OpenSSL release notes, IETF drafts, and vendor blog posts to get a straight answer.

Why this matters

Every TLS connection your server completes today is recorded somewhere — by network operators, by passive collectors at IXPs, by adversaries with the budget to tap submarine cables. Classical key agreement (X25519, P-256, P-384) is secure against today's computers but vulnerable to Shor's algorithm on a sufficiently large quantum computer. The attack is called "harvest now, decrypt later" (HNDL): capture ciphertext now, store it cheaply, decrypt it the day a cryptographically relevant quantum computer (CRQC) exists.

CRQC timelines are estimates, not promises — but the U.S. government, Google, Cloudflare, Apple, and Signal have all decided the risk is real enough to ship hybrid post-quantum key agreement now, while classical ECDH still works as a safety net. If your data has a confidentiality lifetime measured in years (health records, source code, legal contracts, intellectual property, journalist sources, secrets that protect critical infrastructure), the migration window has already closed: anything captured today must already be PQ-protected.

Industry consensus

The hybrid X25519MLKEM768 group (IANA codepoint 0x11EC) is now the default outbound TLS group in every major shipping browser and most modern TLS stacks:

The standards

The cryptography is no longer experimental. NIST finalized the core post-quantum suite as Federal Information Processing Standards in 2024:

The wire-format integration into TLS 1.3 is specified by the IETF:

Government mandates & timelines

This isn't only an industry preference. National security agencies and civilian governments are actively setting deadlines:

Why hybrid, not pure PQ

The rational migration path is hybrid: the TLS 1.3 key share combines a classical ECDH share (X25519 or P-256) with an ML-KEM-768 KEM share, and the session key is derived from both. Neither half alone determines the key. This means:

Pure-PQ-only modes exist but are uncommon, because hybrid is strictly safer during the transition. CheckPQC reports both HYBRID_ENABLED (the recommended posture) and PQC_ENABLED (pure PQ, also good but uncommon) as positive verdicts.

Methodology

Every scan runs a twin probe: two TLS 1.3 handshakes back-to-back against the same endpoint.

  1. Hybrid attempt. Our ClientHello advertises X25519MLKEM768:SecP256r1MLKEM768:X25519:secp384r1:prime256v1 as supported groups. If the server picks one of the first two we know PQ is live.
  2. Classical-only attempt. Same handshake but with PQ groups stripped. This lets us answer "would the server have used PQ if it could?"

The pair lets us produce seven distinct verdicts, including AVAILABLE_NOT_ACTIVE (the server's stack supports PQ but isn't picking it) and NOT_READY (the server breaks when PQ groups appear in the ClientHello — a real bug that several older TLS stacks exhibit).

What we don't test (yet)

Open methodology

The scanner methodology is documented end-to-end in our Knowledge base: the supported groups we offer, the named-group registry we match against, and the seven verdict codes we emit. If you spot a misclassification or want to suggest a new test, please reach out via the contact form.