Post-Quantum Cryptography Security Lab
Secure Channel Establishment
ML-KEM-512Establish a quantum-secure shared secret using the Lattice-based ML-KEM-512 algorithm, immune to Shor's algorithm and harvest-now-decrypt-later attacks.
Alice
Bob
Network Intercept (Hacker View)
Real-time packet capture of the key exchange process.
Digital Identity & Verification
ML-DSA-44Authenticate transactions with ML-DSA-44 (Dilithium), ensuring non-repudiation and integrity even against quantum computers.
Issue Identity
Sign Message
β Hacker Intercept β
Simulate a Man-in-the-Middle attack by modifying the data before it reaches the receiver.
Verify Integrity
PQ-Drop File Transfer
Hybrid: Kyber + AES-256Transfer files protected by a hybrid cryptosystem: AES-256-GCM for high-speed data payload encryption and ML-KEM-512 for quantum-safe key encapsulation.
1. Recipient Setup
2. Secure Upload
Drag & Drop file here
or click to browseDeep Packet Inspection (Hacker View)
3. Secure Download
Secure Vault Storage
AES-256-GCM (In-Memory)Store sensitive secrets in volatile memory, encrypted at rest with AES-256-GCM to prevent cold-boot and memory dump attacks.
Memory Dump (Hacker View)
Quantum Steganography
LSB EncodingHide secret messages within image pixels using Least Significant Bit (LSB) modification. Detectable only by statistical analysis.
1. Select Cover Image
π Drag & Drop Image Here
or click to browse2. Secret Message
3. Result (Stego-Image)
Right-click to save or use the download button. Looks identical to original.
4. π΅οΈ Bit Plane Analyzer
Select a bit plane to visualize. Hidden data lives in Bit 0 (LSB).
Zero Knowledge Proof (ZKP)
Fiat-ShamirProve you know a secret x (where y = gx) without revealing it to the server.
1. Prover (You)
2. Protocol Flow
Verification
Quantum PKI (Mini-CA)
Root CAIssue X.509 Certificates signed by the Lab's internal Root Certificate Authority.
Subject Information
Private Key (Keep Safe)
Signed Certificate (Public)
Lattice & LWE Visualizer
Kyber FoundationLearning With Errors (LWE): Finding the secret structure (line) becomes computationally hard when random "noise" is added. This hardness protects Kyber (ML-KEM).
Red dots = Noisy Public Data. Blue line = Secret Key. Recovering Blue from Red is hard!
Secret Slope
Merkle Tree Explorer
SPHINCS+ FoundationHash-based signatures use a Merkle Tree to verify many One-Time Signatures (OTS) using a single Public Key (the Root).
1. Enter Leaves (Data)
2. Merkle Root & Structure
3. Verify Proof (Efficiency Demo)
Check if a specific transaction exists in the tree using only O(log N) hashes.
Grover's Search Algorithm
Quantum SpeedupQuantumly searching an unsorted database of Size N takes only O(βN) steps.
Shor's Algorithm (Period Finding)
RSA BreakerQuantum computers can efficiently find the period r of a function, which is the key step to factoring large numbers and breaking RSA.
Period (r)
QKD Simulator (BB84)
Quantum Key DistributionSecure key exchange using the properties of Quantum Mechanics. Attempts to observe the photons will disturb the key.
Alice (Sender)
Quantum Channel
Bob (Receiver)
Monitor encrypted traffic flows in real-time to detect anomalous data exfiltration patterns.
Traffic Analysis (Hacker View)
Analyze metadata (packet size, timing) to infer content type.
System Audit Log
Real-time| Timestamp | Event | Status | Detail |
|---|
System Health
CPU Load
RAM Usage
Disk Usage
Entropy
Uptime
Platform
Hashing Studio
Compare classical and modern hashes. Notice how slight changes affect the output (Avalanche Effect).
AES-256 Playground
Symmetric Encryption using AES-GCM/CTR. You control the Key and IV.
HMAC Authentication
Keyed-Hash Message Authentication Code. Verifies both Integrity and Authenticity.
Password Quantum Audit
Estimate time to crack your password using Classical vs Quantum (Grover's) Computers.
Classical Time
Quantum Time
Entropy Bits
Brute Force Attack (Hacker View)
Simulate a dictionary attack against this password.
Entropy Visualizer
Visualizing True Randomness (TRNG/CSPRNG) from the OS.
User Guide
1. β‘ Key Exchange (ML-KEM-512)
Goal: Securely negotiate a Shared Secret immune to quantum decryption.
- Click β‘ Negotiate Keys to run the protocol.
- Hacker View: Click β CUT WIRE to simulate a Denial of Service (DoS) attack.
- Observe how the handshake fails when the connection is severed.
2. πͺͺ Digital Identity (ML-DSA-44)
Goal: Sign messages with a quantum-resistant digital signature.
- Click Generate Keys.
- Type a message and click Sign Data.
- Hacker View: Enter modified text and click π Tamper Data.
- Click Verify Integrity. Tampered signatures will be rejected.
3. π¦ PQ-Drop File Transfer
Goal: Transfer files using Hybrid Encryption (Kyber + AES).
- Init Receiver to generate keys.
- Upload a file to Encrypt & Send.
- Hacker View: Observe "Deep Packet Inspection" logs showing metadata leakage (Traffic Analysis).
4. π‘ QKD (BB84) Protocol
Goal: Distribute keys using quantum mechanics (photons).
- Click Start QKD Sequence to transmit photons.
- Hacker View: Click π΅οΈ ENABLE INTERCEPT ATTACK to eavesdrop.
- Observe how measuring the photons introduces errors (noise) that Alice and Bob detect.
5. π³ Merkle Tree Explorer
Goal: Verify data integrity using hash trees.
- Enter transactions and click Build Hash Tree.
- Hacker View: Click π Tamper Data to corrupt a transaction.
- Notice how the Root Hash changes completely, alerting the network.
6. π Zero Knowledge Proof (ZKP)
Goal: Prove knowledge of a secret without revealing it.
- Enter a secret and click Start Proof to verify normally.
- Hacker View: Click π Impersonate (Cheat) to guess the response.
- See how the Verifier eventually catches the imposter (approx 50% chance per round).
7. πΈοΈ Lattice (LWE) Visualizer
Goal: Visualize Learning With Errors hardness assumption.
- Click Generate Noisy Data.
- Try to visually determine the precise slope (secret) amidst the noise.
8. π Password Audit
Goal: Test password strength against classical and quantum attacks.
- Enter a password.
- Hacker View: Click π Start Dictionary Attack to simulate a real-time breach.
- Compare time-to-crack for Brute Force vs. Grover's Algorithm.
9. π‘οΈ Network Guard
Goal: Monitor network traffic and anomalies.
- View real-time RX/TX graphs.
- Hacker View: The "Traffic Analyzer" card attempts to infer activity types (e.g., "File Upload Detected") based on packet size.
10. π οΈ Standard Labs
- Secure Vault: Store secrets in AES-256 encrypted memory.
- Steganography: Hide secrets in images (LSB).
- Quantum PKI: Issue X.509 certificates.
- Hash Studio: Experiment with SHA-256, SHA-3, etc.
- AES & HMAC: Basic symmetric encryption and integrity checks.
- Entropy: Visualize system randomness.