Post-Quantum Shield
This skill prepares your system for the era of quantum computing by securing data against future decryption threats.
Capabilities
- Quantum Vulnerability Scan
-
Identifies usage of algorithms like RSA, ECC, and Diffie-Hellman that are vulnerable to Shor's algorithm.
-
Audits TLS configurations and SSH keys.
- PQC Migration Planning
-
Recommends replacement with NIST-approved PQC algorithms (e.g., Kyber, Dilithium).
-
Helps implement hybrid cryptographic schemes for a safe transition.
Usage
-
"Perform a quantum vulnerability audit on our encryption layer."
-
"Generate a migration plan to upgrade our root certificates to post-quantum standards."
Knowledge Protocol
- This skill adheres to the knowledge/orchestration/knowledge-protocol.md . It automatically integrates Public, Confidential (Company/Client), and Personal knowledge tiers, prioritizing the most specific secrets while ensuring no leaks to public outputs. \n## Governance Alignment\n\n- This skill aligns with IPA non-functional standards and FISC security guidelines to ensure enterprise-grade compliance.