demonstration of quantum cryptography 🐈 🔐 , one-time pad communication via BB84. repo for our IT Security Master project
-
Updated
Feb 11, 2023 - Jupyter Notebook
demonstration of quantum cryptography 🐈 🔐 , one-time pad communication via BB84. repo for our IT Security Master project
The security of our critical infrastructure is threatened by the advent of future quantum computers, breaking asymmetric cryptography – an essential part of our secure communication architecture. Quantum key distribution (QKD) remedies this weakness by providing a long term secure solution, safe against attacks from quantum computers.
The aim is to allow Alice and Bob to generate a secure private key that can be used for the one-time pad without having to meet privately.
Python code to compute optimal protocol parameters for different QKD protocols.
A Python-based simulator for analyzing the security of quantum communication systems. Currently focuses on the BB84 protocol. Designed for educational and research purposes.
This repo consists of a python demonstration of the BB84 protocol of Quantum Key Distribution.
Possible implementation of BB84 protocol using Simulaqron
Hybrid quantum-classical encryption system using BB84 protocol, AES-256, HMAC, and optional post-quantum signatures. Includes full GUI and scientific metrics logging.
BB84 quantum cryptography protocol in Golang
My assignment solutions for Quantum Computing Workshop
A simulation of the BB84 protocol in a Jupyter Notebook using the code from https://qiskit.org/textbook/ch-algorithms/quantum-key-distribution.html. Protocol steps until key sifting have been implemented. Error correction & parameter estimation were not executed.
Quantum Key Distribution (QKD) Simulator
QuForce Project to implement asymmetric cloning to eavesdrop on the BB84 protocol.
Federated Multimodal Cyberattack classification model on social media messages (utilizing blockchain and quantum key cryptography). Blockchain server at https://cyberattack-blockchain.onrender.com/. Model interaction link below.
Interactive simulator demonstrating the BB84 Quantum Key Distribution protocol using quantum principles of superposition and measurement
Submission for the Quantum Games Hackathon 2024. Made in one day using Unity
Qiskit Implementation of Fiber-Based BB84 Quantum Key Distribution with Intercept-Resend Attack for Eavesdropper Localization
The model of the quantum key exchange protocol BB84, implemented with high-level programming language Silq
A collection of 3 encryption protocols
Add a description, image, and links to the bb84-protocol topic page so that developers can more easily learn about it.
To associate your repository with the bb84-protocol topic, visit your repo's landing page and select "manage topics."