Live
Black Hat USADark ReadingBlack Hat AsiaAI BusinessThis International Fact-Checking Day, use these 5 tips to spot AI-generated contentFast Company TechRio Receipt Protocol – Cryptographic Proof for AI ActionsHacker News AI TopNew AI testing method flags fairness risks in autonomous systemsTechXplore AI[D] Make. Big. Batch. Size.Reddit r/MachineLearningNew open source AI self driving testingHacker News AI TopAgentic AI and the next intelligence explosionHacker News AI TopThe miracle of AI agent-assisted learningHacker News AI TopGoogle launches Gemma 4, its "most intelligent" open model family, purpose-built for advanced reasoning and agentic workflows, under an Apache 2.0 license (The Keyword)TechmemeA Differentiable Programming System to Bridge Machine Learning and ScientificComputingDev.to AIWhy Your AI Copilot Builds the Wrong Thing (And How to Fix It)Dev.to AIThe productivity paradox of AI coding assistantsHacker News AI TopBuilding Sentinel Gate: A 3-Layer Security Pipeline for AI AgentsDev.to AIBlack Hat USADark ReadingBlack Hat AsiaAI BusinessThis International Fact-Checking Day, use these 5 tips to spot AI-generated contentFast Company TechRio Receipt Protocol – Cryptographic Proof for AI ActionsHacker News AI TopNew AI testing method flags fairness risks in autonomous systemsTechXplore AI[D] Make. Big. Batch. Size.Reddit r/MachineLearningNew open source AI self driving testingHacker News AI TopAgentic AI and the next intelligence explosionHacker News AI TopThe miracle of AI agent-assisted learningHacker News AI TopGoogle launches Gemma 4, its "most intelligent" open model family, purpose-built for advanced reasoning and agentic workflows, under an Apache 2.0 license (The Keyword)TechmemeA Differentiable Programming System to Bridge Machine Learning and ScientificComputingDev.to AIWhy Your AI Copilot Builds the Wrong Thing (And How to Fix It)Dev.to AIThe productivity paradox of AI coding assistantsHacker News AI TopBuilding Sentinel Gate: A 3-Layer Security Pipeline for AI AgentsDev.to AI
AI NEWS HUBbyEIGENVECTOREigenvector

Quantum-Safe Code Auditing: LLM-Assisted Static Analysis and Quantum-Aware Risk Scoring for Post-Quantum Cryptography Migration

arXiv cs.SEby [Submitted on 1 Apr 2026]April 2, 20262 min read1 views
Source Quiz

arXiv:2604.00560v1 Announce Type: cross Abstract: The impending arrival of cryptographically relevant quantum computers (CRQCs) threatens the security foundations of modern software: Shor's algorithm breaks RSA, ECDSA, ECDH, and Diffie-Hellman, while Grover's algorithm reduces the effective security of symmetric and hash-based schemes. Despite NIST standardising post-quantum cryptography (PQC) in 2024 (FIPS 203 ML-KEM, FIPS 204 ML-DSA, FIPS 205 SLH-DSA), most codebases lack automated tooling to inventory classical cryptographic usage and prioritise migration based on quantum risk. We present Quantum-Safe Code Auditor, a quantum-aware static analysis framework that combines (i) regex-based detection of 15 classes of quantum-vulnerable primitives, (ii) LLM-assisted contextual enrichment to c

View PDF HTML (experimental)

Abstract:The impending arrival of cryptographically relevant quantum computers (CRQCs) threatens the security foundations of modern software: Shor's algorithm breaks RSA, ECDSA, ECDH, and Diffie-Hellman, while Grover's algorithm reduces the effective security of symmetric and hash-based schemes. Despite NIST standardising post-quantum cryptography (PQC) in 2024 (FIPS 203 ML-KEM, FIPS 204 ML-DSA, FIPS 205 SLH-DSA), most codebases lack automated tooling to inventory classical cryptographic usage and prioritise migration based on quantum risk. We present Quantum-Safe Code Auditor, a quantum-aware static analysis framework that combines (i) regex-based detection of 15 classes of quantum-vulnerable primitives, (ii) LLM-assisted contextual enrichment to classify usage and severity, and (iii) risk scoring via a Variational Quantum Eigensolver (VQE) model implemented in Qiskit 2.x, incorporating qubit-cost estimates to prioritise findings. We evaluate the system across five open-source libraries -- python-rsa, python-ecdsa, python-jose, node-jsonwebtoken, and Bouncy Castle Java -- covering 5,775 findings. On a stratified sample of 602 labelled instances, we achieve 71.98% precision, 100% recall, and an F1 score of 83.71%. All code, data, and reproduction scripts are released as open-source.

Comments: 13 pages, 2 figures. Code and evaluation data: this https URL

Subjects:

Cryptography and Security (cs.CR); Software Engineering (cs.SE); Quantum Physics (quant-ph)

ACM classes: D.2.5; E.3; K.6.5

Cite as: arXiv:2604.00560 [cs.CR]

(or arXiv:2604.00560v1 [cs.CR] for this version)

https://doi.org/10.48550/arXiv.2604.00560

arXiv-issued DOI via DataCite (pending registration)

Submission history

From: Animesh Shaw [view email] [v1] Wed, 1 Apr 2026 07:10:17 UTC (141 KB)

Was this article helpful?

Sign in to highlight and annotate this article

AI
Ask AI about this article
Powered by Eigenvector · full article context loaded
Ready

Conversation starters

Ask anything about this article…

Daily AI Digest

Get the top 5 AI stories delivered to your inbox every morning.

More about

modelreleaseannounce

Knowledge Map

Knowledge Map
TopicsEntitiesSource
Quantum-Saf…modelreleaseannounceopen-sourceproductanalysisarXiv cs.SE

Connected Articles — Knowledge Graph

This article is connected to other articles through shared AI topics and tags.

Knowledge Graph100 articles · 173 connections
Scroll to zoom · drag to pan · click to open

Discussion

Sign in to join the discussion

No comments yet — be the first to share your thoughts!

More in Releases