ExeQuantum's Cryptographic Discovery

Automate Cryptographic Discovery & Inventory with CipherScout

Generate a regulation-ready CBOM and mitigate 'harvest now, decrypt later' risks in days.


CipherScout is proprietary ExeQuantum technology. All scanners are designed, engineered, and maintained entirely by ExeQuantum. No third-party discovery tooling is used.

Live PQC hybrid detection

Fleet-level JWT analysis

Email crypto (DKIM · ARC · S/MIME)

Air-gapped & sovereign deployments

Read-only · No private key access

Complete Cryptographic Inventory Across 10 Critical Surfaces.

CipherScout collects natively across every surface. Every collector is precision-engineered in-house by ExeQuantum to reach the cryptographic detail that matters for accurate PQC risk assessment.

Deep TLS visibility

Live PQC Hybrid Group Detection

CipherScout detects whether a server has already deployed post-quantum hybrid key exchange, including the ML-KEM hybrid groups recommended by NIST and IETF, directly from a live TLS session. Most scanners report only protocol version and cipher suite. CipherScout goes a level deeper, surfacing whether the server is already making the transition.

Certificate inventory

Certificate Discovery & Risk Assessment

CipherScout retrieves and analyses every certificate presented across your estate, including algorithm type, key size, signature method, issuer chain, and expiry, across HTTPS, SMTPS, LDAPS, and any other certificate-presenting service. Each certificate receives a Quantum Health Score reflecting its vulnerability to Shor's algorithm. The output is a complete, prioritised certificate inventory your PKI and infrastructure teams can act on directly.

API authentication layer

API Authentication Cryptography Assessment

APIs authenticate callers using cryptographic mechanisms, such as token signing algorithms, key types, and OIDC configurations that are rarely audited at the cryptographic level. CipherScout analyses the algorithm commitments your APIs make to every relying party, combining JWKS, OIDC metadata, and TLS posture into a composite quantum vulnerability score for each API authentication surface.

SSH infrastructure

SSH Host Key Assessment

Every SSH server advertises public host keys that clients use to verify its identity. If those keys use quantum-vulnerable algorithms, with RSA being the most common, the administrative access path to your entire server estate is exposed. CipherScout connects to SSH endpoints and reads the advertised host key types and fingerprints without authenticating, without interacting beyond the key exchange phase, and without collecting any credentials or session content.

Underscanned surfaces

Full Email Cryptography Inventory

Email infrastructure carries its own cryptographic footprint, such as signing keys, authentication mechanisms, and transport security. CipherScout assesses the full email cryptographic surface in a single pass, including the signing algorithms protecting outbound mail and the certificate properties of signed messages (i.e. S/MIME). No email content is read - only the encryption used to encrypt it to ensure nobody else can either.

Live, not static

Fleet-Wide JWT Posture Analysis

CipherScout connects directly to the user's token database and analyses the entire JWT population in bulk. Algorithm distribution, header injection risk indicators, claim completeness, and worst-case Quantum-Health Score (QHS) across the fleet. The output is a compliance view, not an individual token report.

Data layer coverage

Database Transport & Auth Crypto

For declared database targets, CipherScout assesses how data is protected in transit and at rest, covering the encryption on the connection itself, the authentication mechanism in use, and replication security. Assessment is scoped strictly to customer-declared systems, keeping the tool within compliance auditing.

Cloud key inventory

Cloud Key Management Inventory

CipherScout retrieves key algorithm, rotation status, expiry, and configuration metadata from cloud key management services across major providers and custom private cloud environments. Access is strictly read-only, and no key material is accessed or returned at any point.

Codebase visibility

Source Code Cryptographic Analysis

CipherScout scans customer-supplied source code to identify where classical cryptographic algorithms are used across the codebase, including legacy hash functions, deprecated key types, and hardcoded cryptographic material. Findings pinpoint exact file locations, giving development teams an actionable list rather than a summary.

Hardware

Device & Edge (including IoT, OT, Air-Gapped)

CipherScout can also be deployed on-premise to scan local certificates, keys, and other encryption in devices on the hardware and OS levels. It can be deployed in devices (i.e. Mac) as well as IoT, OT, and air-gapped systems to find and inventory its cryptography.

Risk Quantification

PQC Risk Quantification & Quantum Health Scoring.

The Quantum Health Score (QHS) engine assigns each discovered asset a 0–100 risk score based on the known quantum security properties of its algorithm - Shor's algorithm exposure for asymmetric cryptography, Grover's algorithm impact for symmetric. Scores are derived from NIST SP 800-208, FIPS 203/204/205, and the broader cryptographic research community.

Scores are static classifications applied to collected metadata. A score of 5 for an RSA-2048 key means RSA-2048 is known to be breakable by a sufficiently powerful quantum computer.

The composite Quantum Health Score (QHS) aggregates asset scores across five weighted surface categories into a single 0–100 management metric, weighted toward TLS/Transport (40%) and Identity (30%) where quantum exposure is highest.
ALGORITHM
QUANTUM BASIS
QHS RANGE
RSA (any key size)
Broken by Shor's
0-10
ECDSA / EC curves
Broken by Shor's
10-20
EdDSA (Ed25519/448)
Broken by Shor's
15-25
AES-128/256
Quantum secure (as of now)
80-100
MD5 / SHA-1
Classically + quantum weak
0-5
MLKEM768
NIST PQC standard (non-hybrid)
85-90
MLDSA65
NIST PQC standard (non-hybrid)
85-90
X25519MLKEM768
PQC hybrid
100
Native CycloneDX 1.7 Cryptographic Bill of Materials.
Not a conversion. Not a report.

cbom-output.cdx.json

{
  "bomFormat": "CycloneDX",
  "specVersion": "1.7",
  "components": [{
    "type": "cryptographic-asset",
    "name": "TLS-endpoint",
    "cryptoProperties": {
      "assetType": "protocol",
      "algorithmProperties": {
        "primitive": "key-agreement",
        "keyLength": 2048,
        "name": "RSA"
      }
    },
    "properties": [{
      "name": "qvs-score",
      "value": "95"  // quantum vulnerable
    },{
      "name": "quantum-vulnerable",
      "value": true
    },{
      "name": "pqc-hybrid-detected",
      "value": false
    }]
  }]
}

Automated PQC Migration Roadmaps & Audit-Ready Findings.

Most cryptographic audits end with a spreadsheet. CipherScout ends with a migration roadmap your whole organisation can act on and an auditable findings record your compliance team can rely on.

Deterministic

Post-Quantum Security
Findings Report

Every scan produces a structured findings report telling you exactly which cryptographic assets are quantum-vulnerable, how severe the exposure is, and what you already have right. Generated by a rules engine, not AI, so the output is reproducible, auditable, and defensible in regulated environments.

  • Severity-graded findings across every scanned surface
  • A single Quantum Health Score your board can understand
  • Consistent output across every scan. No surprises, no drift
  • What's already working, not just what isn't
Download sample findings report

AI-Assisted

PQC Migration Report

Turn your findings into a migration plan with phases, priorities, and concrete next steps at the push of a button. Built on your CBOM, never on assumptions. The kind of report a CISO takes to the board, and a DevOps team can actually execute.

  • Phased migration plan from inventory through to PQC cutover
  • Action steps with suggested owners and acceptance criteria
  • Tooling recommendations for your environment
  • Rollback and risk management built in from the start
Download sample migration report
AI Analysis

AI that works the way regulated
organisations need it to.

Getting a migration report shouldn't necessarily mean sending your security data to a third-party AI. With CipherScout, it doesn't have to.

Your data never reaches us.

The AI migration report is generated from your CBOM, which is a record of cryptographic configuration, not business data. No credentials, no payloads, no application content. Under CipherScout's standard deployment, ExeQuantum cannot see your CBOM, your findings, or the report you generate. What happens in your environment stays there.

Off by default. On when you choose.

AI processing is disabled unless you enable it. Your findings report, CBOM export, and Quantum Health Scores are all produced without any AI involvement. The migration report is a separate step you opt into. It runs once, on demand, against the CBOM you choose to submit. No background processing, no automatic analysis.

Use the AI provider your organisation already approves.

You are not required to use a specific AI provider. If your organisation has an approved AI deployment, be it a managed Azure OpenAI instance, a locally-hosted model, or any other compliant configuration, you can point CipherScout's AI layer at that instead. Your procurement and security policies stay intact.

The findings report is not AI. It is produced by a deterministic rules engine. Same CBOM in, same findings out, every time. The AI migration report is a separate, optional step that turns those findings into a plan. If your environment, policy, or preference requires a fully AI-free workflow, the findings report and CBOM export cover everything you need.

How it works in regulated environments

Deploy without compromising data sovereignty

  • Runs on-premises, air-gapped, or in sovereign/dedicated environments
  • No requirement for discovered data to leave the customer boundary
  • Supports customer-controlled hosting and storage
  • Suitable for government, critical infrastructure, and regulated industries
  • Evidence-based discovery with minimal data exposure

  • Collects cryptographic metadata and posture, not sensitive payloads
  • Stores findings as normalized evidence records (CBOM-style inventory)
  • Optional redaction of identifiers (hostnames, IPs, cert subjects) for export
  • Outputs designed for audit, risk, and remediation workflows
  • Least-privilege by design

  • Read-only access where credentials are required
  • Customer-owned secrets and credential lifecycle
  • No persistent privileged agents unless explicitly configured
  • Compatible with existing IAM and access control policies
  • Built for ongoing compliance, not one-off reports

  • Supports scheduled and repeatable discovery runs
  • Detects cryptographic drift over time
  • Produces consistent, comparable evidence across scans
  • Enables long-term crypto-agility and PQ transition planning
  • The inventory regulators
    are starting to require.

    Governments and standards bodies worldwide are formalising cryptographic inventory requirements. CipherScout's CBOM output is designed to satisfy them.

    NIST PQC Standards

    CipherScout automatically benchmarks your entire cryptographic inventory against the finalized NIST Post-Quantum Cryptography standards. Our deterministic engine identifies non-compliant legacy algorithms and validates your fleet's readiness for FIPS 203, 204, and 205. The output is a high-level compliance view that quantifies your transition progress with a unified Quantum-Health Score (QHS).

    FIPS 203

    FIPS 204

    FIPS 205

    SP 800-208

    SP 800-131A

    Financial & Critical Infrastructure

    Cryptographic inventory is now an explicit requirement under PCI DSS 4.0 (Requirement 12.3.3). CipherScout's five-surface coverage and CBOM output satisfy the inventory evidence requirement.

    PCI DSS 4.0

    ISO/IEC 18033

    GDPR

    ISM

    Government & Sovereign Requirements

    Air-gapped deployment, data residency controls, and the absence of private key handling make CipherScout suitable for government and critical infrastructure environments subject to ACSC, BSI, and ENISA guidance.

    ACSC ISM

    BSI (DE)

    ENISA

    CISA

    Start your cryptographic inventory.

    A CipherScout discovery scan gives you a complete picture of your quantum exposure across every surface, in a format regulators and auditors understand, in days, not months.
    Book a discovery scan