Post-Quantum Cryptography Security Lab

Secure Channel Establishment

ML-KEM-512

Establish a quantum-secure shared secret using the Lattice-based ML-KEM-512 algorithm, immune to Shor's algorithm and harvest-now-decrypt-later attacks.

A

Alice

---
PK
CT
B

Bob

---
πŸ‘οΈ

Network Intercept (Hacker View)

Real-time packet capture of the key exchange process.

OFFSET HEX DATA ASCII / INFO
00000000 -- -- -- -- WAITING FOR HANDSHAKE...

Digital Identity & Verification

ML-DSA-44

Authenticate transactions with ML-DSA-44 (Dilithium), ensuring non-repudiation and integrity even against quantum computers.

01

Issue Identity

Not Generated
02

Sign Message

---
!

⚠ Hacker Intercept ⚠

Simulate a Man-in-the-Middle attack by modifying the data before it reaches the receiver.

> Listening for ML-DSA-44 Signatures...
03

Verify Integrity

Pending

PQ-Drop File Transfer

Hybrid: Kyber + AES-256

Transfer files protected by a hybrid cryptosystem: AES-256-GCM for high-speed data payload encryption and ML-KEM-512 for quantum-safe key encapsulation.

1. Recipient Setup

---

2. Secure Upload

πŸ“‚

Drag & Drop file here

or click to browse
πŸ•·οΈ

Deep Packet Inspection (Hacker View)

[PROTOCOL]
Hybrid Encap (Kyber) + AES-256-GCM
> Waiting for file upload...

3. Secure Download

Secure Vault Storage

AES-256-GCM (In-Memory)

Store sensitive secrets in volatile memory, encrypted at rest with AES-256-GCM to prevent cold-boot and memory dump attacks.

Memory Dump (Hacker View)

Snapshots of heap memory at 0x84F...
[EMPTY] No active secrets in stack

Quantum Steganography

LSB Encoding

Hide secret messages within image pixels using Least Significant Bit (LSB) modification. Detectable only by statistical analysis.

1. Select Cover Image

πŸ“ Drag & Drop Image Here

or click to browse

2. Secret Message

3. Result (Stego-Image)

Right-click to save or use the download button. Looks identical to original.

4. πŸ•΅οΈ Bit Plane Analyzer

Select a bit plane to visualize. Hidden data lives in Bit 0 (LSB).

Zero Knowledge Proof (ZKP)

Fiat-Shamir

Prove you know a secret x (where y = gx) without revealing it to the server.

1. Prover (You)

2. Protocol Flow

Waiting for proof...

Verification

--
Server Status

Quantum PKI (Mini-CA)

Root CA

Issue X.509 Certificates signed by the Lab's internal Root Certificate Authority.

Subject Information

Private Key (Keep Safe)

Signed Certificate (Public)

Lattice & LWE Visualizer

Kyber Foundation

Learning With Errors (LWE): Finding the secret structure (line) becomes computationally hard when random "noise" is added. This hardness protects Kyber (ML-KEM).

Red dots = Noisy Public Data. Blue line = Secret Key. Recovering Blue from Red is hard!

Secret Slope

?
Recovered via Lattice Reduction (LLL) (Not simulated here)

Merkle Tree Explorer

SPHINCS+ Foundation

Hash-based signatures use a Merkle Tree to verify many One-Time Signatures (OTS) using a single Public Key (the Root).

1. Enter Leaves (Data)

2. Merkle Root & Structure

Wait...
Tree structure will appear here...

3. Verify Proof (Efficiency Demo)

Check if a specific transaction exists in the tree using only O(log N) hashes.

Proof Details...

Grover's Search Algorithm

Quantum Speedup

Quantumly searching an unsorted database of Size N takes only O(√N) steps.

Shor's Algorithm (Period Finding)

RSA Breaker

Quantum computers can efficiently find the period r of a function, which is the key step to factoring large numbers and breaking RSA.

Period (r)

--

QKD Simulator (BB84)

Quantum Key Distribution

Secure key exchange using the properties of Quantum Mechanics. Attempts to observe the photons will disturb the key.

Alice (Sender)

1
0
1
1

Quantum Channel

〰️ 〰️ 〰️

Bob (Receiver)

Waiting for photons...
Live Monitoring

Monitor encrypted traffic flows in real-time to detect anomalous data exfiltration patterns.

Download Speed
0 KB/s
β–Ό Incoming
Upload Speed
0 KB/s
β–² Outgoing
Total Packets
0
Transmitted
πŸ•·οΈ

Traffic Analysis (Hacker View)

Analyze metadata (packet size, timing) to infer content type.

Current Inference:
LISTENING...

System Audit Log

Real-time
Timestamp Event Status Detail

System Health

CPU Load

--%
Processor

RAM Usage

--%
Memory

Disk Usage

--%
Storage

Entropy

--%
Randomness

Uptime

--
Session

Platform

--
OS

Hashing Studio

Compare classical and modern hashes. Notice how slight changes affect the output (Avalanche Effect).

...

AES-256 Playground

Symmetric Encryption using AES-GCM/CTR. You control the Key and IV.

Result will appear here...

HMAC Authentication

Keyed-Hash Message Authentication Code. Verifies both Integrity and Authenticity.

...

Password Quantum Audit

Estimate time to crack your password using Classical vs Quantum (Grover's) Computers.

Classical Time

--
Brute Force

Quantum Time

--
Grover's Algorithm

Entropy Bits

0
Strength Score
πŸ’€

Brute Force Attack (Hacker View)

Simulate a dictionary attack against this password.

> Waiting for target...

Entropy Visualizer

Visualizing True Randomness (TRNG/CSPRNG) from the OS.

Raw Hex...
Entropy Score: -- / 8.0

User Guide

1. ⚑ Key Exchange (ML-KEM-512)

Goal: Securely negotiate a Shared Secret immune to quantum decryption.

  • Click ⚑ Negotiate Keys to run the protocol.
  • Hacker View: Click βœ‚ CUT WIRE to simulate a Denial of Service (DoS) attack.
  • Observe how the handshake fails when the connection is severed.

2. πŸͺͺ Digital Identity (ML-DSA-44)

Goal: Sign messages with a quantum-resistant digital signature.

  • Click Generate Keys.
  • Type a message and click Sign Data.
  • Hacker View: Enter modified text and click 😈 Tamper Data.
  • Click Verify Integrity. Tampered signatures will be rejected.

3. πŸ“¦ PQ-Drop File Transfer

Goal: Transfer files using Hybrid Encryption (Kyber + AES).

  • Init Receiver to generate keys.
  • Upload a file to Encrypt & Send.
  • Hacker View: Observe "Deep Packet Inspection" logs showing metadata leakage (Traffic Analysis).

4. πŸ“‘ QKD (BB84) Protocol

Goal: Distribute keys using quantum mechanics (photons).

  • Click Start QKD Sequence to transmit photons.
  • Hacker View: Click πŸ•΅οΈ ENABLE INTERCEPT ATTACK to eavesdrop.
  • Observe how measuring the photons introduces errors (noise) that Alice and Bob detect.

5. 🌳 Merkle Tree Explorer

Goal: Verify data integrity using hash trees.

  • Enter transactions and click Build Hash Tree.
  • Hacker View: Click 😈 Tamper Data to corrupt a transaction.
  • Notice how the Root Hash changes completely, alerting the network.

6. 🎭 Zero Knowledge Proof (ZKP)

Goal: Prove knowledge of a secret without revealing it.

  • Enter a secret and click Start Proof to verify normally.
  • Hacker View: Click 🎭 Impersonate (Cheat) to guess the response.
  • See how the Verifier eventually catches the imposter (approx 50% chance per round).

7. πŸ•ΈοΈ Lattice (LWE) Visualizer

Goal: Visualize Learning With Errors hardness assumption.

  • Click Generate Noisy Data.
  • Try to visually determine the precise slope (secret) amidst the noise.

8. πŸ” Password Audit

Goal: Test password strength against classical and quantum attacks.

  • Enter a password.
  • Hacker View: Click 😈 Start Dictionary Attack to simulate a real-time breach.
  • Compare time-to-crack for Brute Force vs. Grover's Algorithm.

9. πŸ›‘οΈ Network Guard

Goal: Monitor network traffic and anomalies.

  • View real-time RX/TX graphs.
  • Hacker View: The "Traffic Analyzer" card attempts to infer activity types (e.g., "File Upload Detected") based on packet size.

10. πŸ› οΈ Standard Labs

  • Secure Vault: Store secrets in AES-256 encrypted memory.
  • Steganography: Hide secrets in images (LSB).
  • Quantum PKI: Issue X.509 certificates.
  • Hash Studio: Experiment with SHA-256, SHA-3, etc.
  • AES & HMAC: Basic symmetric encryption and integrity checks.
  • Entropy: Visualize system randomness.