Skip to content

QPKI

The post-quantum PKI toolkit in Go.
Issue certificates that quantum computers can't break.
Single binary. No system dependencies. FIPS 203/204/205 compliant.

Quantum is coming. Are you ready?

NIST has finalized post-quantum standards. Governments target 2030 for migration.

The Deadline

NIST, NSA, and major governments target 2030 for post-quantum migration. RSA-2048 and ECC will be deprecated.

Harvest Now, Decrypt Later

Adversaries are already collecting encrypted data. When quantum computers arrive, they'll decrypt everything.

Standards Are Ready

NIST finalized FIPS 203, 204, 205 in 2024. The algorithms exist. The tools exist. Time to act.

2024 NIST standards finalized
2027 NSA mandates PQC for new systems
2030 Legacy algorithms deprecated
2035 Full migration required
2024 NIST standards finalized
2027 NSA mandates PQC for new systems
2030 Legacy algorithms deprecated
2035 Full migration required

Your Entire PKI Stack

Everything you need to issue, manage, and verify quantum-safe X.509 certificates.

CLI — qpki Single binary · no system dependencies
Core engine Profiles · Crypto-agility · Credential lifecycle
CA Root · Sub · Issuing
Certificates X.509 · CSR
Services OCSP · CRL · TSA · CMS · COSE
TLS / mTLS Servers · APIs · IoT
Document signing CMS · Timestamps
Identity / IAM COSE · CWT tokens
Post-Quantum
ML-DSA ML-KEM SLH-DSA
Classical
RSA ECDSA EdDSA
Hybrid
Catalyst Composite
Interface
Core
PKI layer
Use cases

Built for the Quantum Era

What makes QPKI different.

3 Commands. 1 Hybrid CA.

From zero to backward-compatible, quantum-safe certificates in under a minute.

~ / my-pki
1
# Initialize a hybrid Root CA
$ qpki ca init --profile hybrid/catalyst/root-ca --ca-dir ./root-ca --var cn="Acme Root CA" --var o="Acme Corp"
Root CA initialized · Catalyst ECDSA+ML-DSA · expires: 2035-01-01
2
# Create a hybrid issuing sub-CA
$ qpki ca init --profile hybrid/catalyst/issuing-ca --ca-dir ./issuing-ca --parent ./root-ca --var cn="Acme Issuing CA"
Sub-CA created · signed by: Acme Root CA
3
# Issue a hybrid server certificate
$ qpki credential enroll --ca-dir ./issuing-ca --profile hybrid/catalyst/tls-server --var cn="api.acme.com" --var dns_names="api.acme.com,*.acme.com"
Hybrid certificate issued · Catalyst ECDSA+ML-DSA · valid: 365 days
Education

Hands-On Post-Quantum Labs

11 hands-on labs for security teams. From quantum threat awareness to crypto-agile migration. Quick path in 20 minutes.

Awareness Build Lifecycle Signatures Encryption Migration
Awareness 2 labs
Build 2 labs
Lifecycle 2 labs
Signatures 3 labs
Encryption 1 lab
Migration 1 lab