KavachQ · The Platform

Quantum-safe migration, simplified for India

KavachQ is a single platform for the full quantum-safe lifecycle — discovery, risk scoring, hybrid roll-out, supplier oversight, and assurance reporting against the DST L1–L4 framework.

Request a demo See the roadmap
ALIGNED WITH NQM Task Force · May 2026 NIST FIPS 203/204/205/206 TEC / STQC / BIS CERT-In · NCCS
The Lifecycle

Five stages, one platform

KavachQ implements the full quantum-safe lifecycle defined in the DST Task Force report — discover, score, plan, migrate, prove.

01 · DISCOVER

Crypto discovery (BOMs)

Automated SBOM, HBOM, and CBOM generation across applications, infrastructure, and hardware. Quantum BOM (QBOM) where applicable. Connectors for code, traffic, and HSM/KMS.

Outputs CBOM in CycloneDX 1.6
02 · SCORE

Quantum risk analysis

Per-asset HNDL and TNFL exposure scoring, Mosca-inequality calculations, and prioritisation against the DST Persona framework (Urgent / Regular / Vendor).

Mosca X+Y vs Z per asset
03 · PLAN

Migration plan

Phased roadmap aligned to the DST milestones (CII 2027/28/29 · Enterprise 2028/30/33), broken down by system, owner, dependency, and supplier.

Auto-aligned to DST milestones
04 · MIGRATE

Hybrid PQC roll-out

Crypto-agility layer for TLS, IPsec/IKEv2, SSH, PKI, and code signing. Hybrid (classical + PQC) by default, with telemetry on every handshake.

ML-KEM · ML-DSA · SLH-DSA · FN-DSA
05 · PROVE

Assurance & reporting

Continuous compliance reporting against DST assurance levels L1 / L2A,B,C / L3 / L4. Board-ready dashboards and regulator-facing exports.

L1 (3y) \u2192 L4 (10y) certificate validity
+ · GOVERN

Supplier & ecosystem

CBOM submission gateway for suppliers, RFP-clause templates, and vendor attestations — the procurement spine the Task Force calls for.

RFP clause library for FY 2027–28
Architecture

How KavachQ fits in

Deployable on-prem, in private cloud, or as a managed service. The crypto-agility layer is the only path between your apps and your trust roots.

Applications
APIs / Services
PKI / mTLS
Devices / IoT
\u2193
KAVACHQ CONTROL PLANE
Crypto-Agility Layer
Discovery
Risk Score
Policy
Telemetry
Assurance
\u2193
HSM / KMS
PQC libraries
ML-KEM · ML-DSA · SLH-DSA
Classical libs
RSA · ECC (legacy)
QKD endpoints
where deployed
QRNG / TRNG

Hybrid (classical + PQC) is the default. Composite PQC–QKD supported where QKD infrastructure exists, per NQM's inter-city and satellite networks targeting 2,000 km reach.

Capability Map

What KavachQ covers, line by line

Mapped one-to-one against the DST Task Force recommendations and Sub-Group I/II frameworks.

CapabilityDST referenceKavachQ moduleOutput
Cryptographic asset repositorySection 9.0 A — Short-termDiscovery + BOM EngineSBOM / HBOM / CBOM
Quantum risk analysisSub-Group II — Phase 1Risk ScoringMosca-graded asset list
Crypto-agile designSection 9.0 — Critical PrinciplesAgility LayerPluggable algorithm provider
Hybrid PQC pilotsSection 9.0 A.1 (sandbox pilots)Pilot WorkspaceHybrid TLS / IKEv2 stacks
CBOM in procurementSection 9.0 B (FY 27–28)Supplier GatewayRFP clause + vendor attestation
L1–L4 assurance reportingSub-Group I — Assurance LevelsAssurance ModuleTiered compliance dashboards
Crypto incident playbooksSub-Group II — Phase 2RunbooksAlgorithm-swap drill scripts
PQC-only trust chainsSub-Group II — Phase 3PKI BridgeIssue / validate PQC certs
Composite PQC–QKD supportSection 8.0 (national backbone)QKD ConnectorComposite-key feed to encryptors
Sectoral persona prioritisationSub-Group II — PersonasPersona ProfileUrgent / Regular / Vendor tagging
Who it's for

Three personas, one platform

Tier 1

Urgent Adopters (CII)

Power, telecom, transport, defence, ISRO, DRDO, ONGC, banking core. Compressed CII timeline: foundations 2027, high-priority migration 2028, full PQC 2029.

L4 assurance · indigenous-first · air-gap modes
Tier 2

Regular Enterprise

Government, financial services, healthcare, insurance, IT services. Standard timeline: foundations 2028, high-priority 2030, full PQC 2033.

L2 / L3 assurance · hybrid by default
Tier 3

Technology Vendors

HSM and KMS makers, cloud providers, PKI operators, network equipment vendors. CBOM submissions mandatory from FY 2027–28.

Vendor portal · attestation API · CycloneDX
Algorithm Support

Every NIST standard, day one

KavachQ ships with the NIST finalised algorithms and the latest selections, plus classical algorithms for hybrid deployment.

FIPS 203

ML-KEM

Module-Lattice KEM (formerly Kyber). Sizes 512 / 768 / 1024.

FIPS 204

ML-DSA

Module-Lattice Signatures (formerly Dilithium). Sizes 44 / 65 / 87.

FIPS 205

SLH-DSA

Stateless Hash-based Signatures (formerly SPHINCS+). Conservative.

FIPS 206 (Draft)

FN-DSA

FFT NTRU Signatures (formerly Falcon). Smallest lattice signatures.

5th Selection

HQC

Code-based KEM, selected March 2025 for algorithmic diversity.

Hybrid

X25519 + ML-KEM

Default hybrid key exchange during the transition window.

Hybrid

ECDSA + ML-DSA

Hybrid signatures for code and certificate chains.

Symmetric

AES-256 · SHA-384/512

Doubled symmetric strength, hardened against Grover.

Get Started

Start with a discovery scan

A 30-minute call to scope a KavachQ Discovery engagement — the first deliverable in any DST-aligned migration plan.

Book a demo Run the maturity scan first