This repository contains research, code implementations, and documentation exploring the shift from traditional cryptographic methods to quantum-resistant security protocols.
As quantum computing evolves, traditional encryption methods that rely on binary bits ( or ) face significant threats. This project investigates how quantum phenomena like Superposition and Entanglement allow quantum computers to process vast possibilities simultaneously, potentially cracking modern encryption in a fraction of the time it would take a traditional computer.
To counter quantum threats, the project explores the BB84 protocol, a quantum key distribution method developed in 1984.
-
Quantum Security: It uses qubits to create secure communication channels between a sender (Alice) and a receiver (Bob).
-
Intrusion Detection: Unlike traditional methods, any attempt to eavesdrop on the communication alters the quantum particles, immediately alerting the parties to a breach.
A comparison between Triple Data Encryption Standard (3DES) and the BB84 protocol reveals a trade-off between speed and security:
| Metric | 3DES (Traditional) | BB84 (Quantum) |
|---|---|---|
| Security Level | High, but vulnerable to quantum attacks | Extremely high, quantum-resistant |
| Speed | ~10,000 bits per second | ~1,000 bits per second |
| Resources | Works on regular computers | Requires specialized hardware |
The implementation was performed using IBM’s Qiskit toolkit. Due to the evolving nature of quantum hardware and software libraries, several technical hurdles were addressed:
-
Hardware Constraints: Adjusted the code to run on 29 qubits instead of 30 to match specific coupling map limitations.
-
Library Updates: Resolved errors related to
QasmQobjby transitioning fromassemble()functions to directbackend.run()methods to ensure compatibility with the latest Qiskit versions.
For a deep dive into the methodology, mathematical foundations, and full experimental results, please refer to the primary report