Tools for PQC Analysis Diana Kučerová 8. 1. 2026

Tools for PQC Analysis

1536x1536_m+_headers_PQC

Software Tools for Cryptographic Inventory

Discover cryptographic risks before they become a threat

An efficient transition to post-quantum cryptography (PQC) begins with a perfect overview.

Manually mapping ciphers in large-scale systems is practically impossible – that is why we have developed a suite of specialized tools that automate data collection and visualize the state of your cryptographic infrastructure.

2560x1440_PQC_01
Step 1

Creating a Cryptographic Bill of Materials CBOM

The cornerstone of migration is the creation of a so-called CBOM (Cryptography Bill of Materials).

It is a standardized inventory of all encryption algorithms, keys, and libraries used by your applications.

Currently, CBOM is becoming an essential basis for ensuring compliance with the DORA regulation. For financial institutions and their suppliers, it represents key evidence of cyber resilience and the ability to manage risks effectively.

Monet+ CBOMpy

Our key tool for static analysis of source code and configuration files.
It serves for the automatic identification of cryptographic primitives across your software and their convenient manual evaluation.

1
Smart Detection

Automatically searches for the use of cryptography in code.

2
Decision Memory

The tool remembers your manual decisions, thereby accelerating every subsequent analysis.

3
Standardized Output

Generates standardized JSON output ready for further automation.

4
Wide Support

From core languages (Java, .NET, Python) to mobile platforms (Kotlin, Swift, Dart).

macbook_01

CORE

Demo version

Features:

  • Language-independent analysis
  • Visualization of findings

STANDARD

Advanced Features

Standard includes:

  • All mainstream programming languages
  • Save/Load Functionality
  • Data import from archives
  • JSON CBOM output file

PROFESSIONAL

The most powerful solution

Professional includes:

  • All mainstream programming languages
  • Save/Load Functionality
  • Data import from archives
  • JSON CBOM output file
  • Automation (CI/CD Pipelines)
  • Direct IDE Integration
Step 2

Validation and Expert Data Enrichment

While automated tools collect data, their context is key for strategic decision-making. This step serves for the authorized evaluation of the state of cryptography and its compliance with security policies.

2560x1440_PQC_02

MONET+ C-Insight

Our proprietary tool for smart editing and management of CBOM files.
It allows specialists to conveniently browse identified cryptographic primitives and add parameters that an automatic scan cannot capture.

mockup_2
1
Statement of Conformity (Attestation)

Performing manual and automated verification of whether the used cipher complies with selected standards (e.g., recommendations from NÚKIB, BSI, ENISA, NIST, or internal guidelines), which are uploaded to MONET+ C-Insight in JSON SBOM format.

2
Quantum Resistance

Clear labeling and mapping of the resistance of individual algorithms to quantum threats for easy prioritization of migration.

3
Smart Data Management

Convenient browsing and adding of parameters in complex JSON structures without the need for direct code editing.

4
Enriched Output

Generates a detailed file in JSON CBOM format, which maintains the full context of the cryptographic inventory and serves as the final basis for visualization and management reports.

Step 3

Threat Visualization and Compliance Control

The final step of the process is the transformation of technical data into a clear picture. Visualization allows security managers and auditors to immediately identify weak spots and track progress in infrastructure security.

2560x1440_03

MONET+ CryptoSunshine

Our open-source tool for comprehensive visualization of the cryptographic inventory.
It serves for the clear interpretation of data and the verification of compliance with recommendations from national and international authorities.

1
TransparentOpen Source

MONET+ CryptoSunshine is an extension of the open-source tool Sunshine, developed under the OWASP CycloneDX umbrella and provided under the Apache 2.0 license, which guarantees maximum trustworthiness.

2
Quantum Risk Detection:

Automatically highlights algorithms that are vulnerable to quantum computers and identifies primitives dependent on them.

3
Compliance Monitoring

Natively displays (non-)compliance with cryptographic standards from NÚKIB, BSI, and ENISA and allows the import of custom internal standards in JSON format.

4
Intuitive Interface

Offers a human-friendly display of complex relationships within the cryptographic inventory, understandable for both technicians and management.

mockup 2
300x300_quantum_computer
From Digital Inventory to a Bulletproof Strategy

Identifying ciphers using our tools is the first step on the journey toward future security. Inventory data is your map; we will help you find the safest path to your destination. Explore how your organization can become quantum-resilient.

Ready to take the first step toward future security?
Scroll to Top