Skip to content

An analytical study and implementation of Quantum Computing's impact on data encryption. This repository includes a comparative analysis between traditional algorithms (3DES) and quantum protocols (BB84) , along with Qiskit-based code implementations.

Notifications You must be signed in to change notification settings

badhon495/Quantum-Encryption-Analysis

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 

Repository files navigation

Quantum Computing's Impact on Data Encryption

This repository contains research, code implementations, and documentation exploring the shift from traditional cryptographic methods to quantum-resistant security protocols.

Project Overview

As quantum computing evolves, traditional encryption methods that rely on binary bits ( or ) face significant threats. This project investigates how quantum phenomena like Superposition and Entanglement allow quantum computers to process vast possibilities simultaneously, potentially cracking modern encryption in a fraction of the time it would take a traditional computer.

Key Highlights

The BB84 Protocol

To counter quantum threats, the project explores the BB84 protocol, a quantum key distribution method developed in 1984.

  • Quantum Security: It uses qubits to create secure communication channels between a sender (Alice) and a receiver (Bob).

  • Intrusion Detection: Unlike traditional methods, any attempt to eavesdrop on the communication alters the quantum particles, immediately alerting the parties to a breach.

Comparative Analysis: 3DES vs. BB84

A comparison between Triple Data Encryption Standard (3DES) and the BB84 protocol reveals a trade-off between speed and security:

Metric 3DES (Traditional) BB84 (Quantum)
Security Level High, but vulnerable to quantum attacks Extremely high, quantum-resistant
Speed ~10,000 bits per second ~1,000 bits per second
Resources Works on regular computers Requires specialized hardware

Implementation & Challenges

The implementation was performed using IBM’s Qiskit toolkit. Due to the evolving nature of quantum hardware and software libraries, several technical hurdles were addressed:

  • Hardware Constraints: Adjusted the code to run on 29 qubits instead of 30 to match specific coupling map limitations.

  • Library Updates: Resolved errors related to QasmQobj by transitioning from assemble() functions to direct backend.run() methods to ensure compatibility with the latest Qiskit versions.

Documentation

For a deep dive into the methodology, mathematical foundations, and full experimental results, please refer to the primary report

About

An analytical study and implementation of Quantum Computing's impact on data encryption. This repository includes a comparative analysis between traditional algorithms (3DES) and quantum protocols (BB84) , along with Qiskit-based code implementations.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published