Inspiration
Quantum computing is crossing from the theoretical to practical boundary quickly and we must design secure systems to withstand the new types of quantum attacks again cryptographic systems we all depend on ranging from banking to communication to home automation and everything in between.
What it does
Project Quantum Leap provides a framework for securing post-quantum systems against quantum cryptographic attacks.
How we built it
By understanding physics, computer science, mathematics, cryptography, materials science, and a lot of trial and error.
Challenges we ran into
Quantum entanglement is challenging as you add more Qubits because of decoherence. Thankfully, we’ve developed a method of isolating the state of quantum operations to allow superposition to unfold.
Accomplishments that we're proud of
We’ve created a POC that describes in detail the six pillars of quantum security and how they can be implemented in a practical manner, namely asymmetric encryption, symmetric encryption, integrity, key management, authentication, and authorization.
What we learned
That quantum computing has the ability to fundamentally change society forever but it must be secured and cultivated
What's next for Post-Quantum Cryptography
Real-world implementation of quantum cryptography into devices, products, and services that we all rely on (computers, phones, networks, banking, space exploration, online voting, clean energy, and transcendence to enlightenment)
Built With
- amazon-web-services
- cia-triad
- computer-security
- cryptography
- data-security
- discrete-mathematics
- gcp
- go
- ionq
- materials-science
- python
- quantum-cryptography
- quantum-mechanics
- radq
- radzen
Log in or sign up for Devpost to join the conversation.