demonstration of quantum cryptography 🐈 🔐 , one-time pad communication via BB84. repo for our IT Security Master project
-
Updated
Feb 11, 2023 - Jupyter Notebook
demonstration of quantum cryptography 🐈 🔐 , one-time pad communication via BB84. repo for our IT Security Master project
The security of our critical infrastructure is threatened by the advent of future quantum computers, breaking asymmetric cryptography – an essential part of our secure communication architecture. Quantum key distribution (QKD) remedies this weakness by providing a long term secure solution, safe against attacks from quantum computers.
The aim is to allow Alice and Bob to generate a secure private key that can be used for the one-time pad without having to meet privately.
Python code to compute optimal protocol parameters for different QKD protocols.
This repo consists of a python demonstration of the BB84 protocol of Quantum Key Distribution.
Possible implementation of BB84 protocol using Simulaqron
This project demonstrates a basic implementation of the BB84 quantum key distribution protocol using Qiskit. The code simulates the process of Alice preparing quantum bits (qubits) with random bases and sending them to Bob, who then measures them with his own randomly chosen bases.
My assignment solutions for Quantum Computing Workshop
A collection of 3 encryption protocols
The model of the quantum key exchange protocol BB84, implemented with high-level programming language Silq
Simulation of the BB84 Protocol
Submission for the Quantum Games Hackathon 2024. Made in one day using Unity
A simulation of the BB84 protocol in a Jupyter Notebook using the code from https://qiskit.org/textbook/ch-algorithms/quantum-key-distribution.html. Protocol steps until key sifting have been implemented. Error correction & parameter estimation were not executed.
Can we send information to the past or future, and due to entanglement past and present are same instance, Quantum delayed choice experiment - already proven impossible - however, personal rework and conceptual understanding
In this repository we provide the codes with which we have obtained the results in the following article arXiv:2407.03119
Federated Multimodal Cyberattack classification model on social media messages (utilizing blockchain and quantum key cryptography). Blockchain server at https://cyberattack-blockchain.onrender.com/. Model interaction link below.
Project done on Jovian, as Jupyter won't easily work on github
This project was developed by rodrigo1514 and I during the HackKean 2023 event. It is an implementation based on the BB84 Protocol, a quantum key distribution scheme.
Add a description, image, and links to the bb84-protocol topic page so that developers can more easily learn about it.
To associate your repository with the bb84-protocol topic, visit your repo's landing page and select "manage topics."