Skip to content

Releases: koraydns/quantum-attack-simulator

v1.0.1

15 Dec 18:45
78b2247
Compare
Choose a tag to compare

[Version 1.0.1] - Bug Fix

Fixed

  • Resolved an issue with the quantum-sim entry point causing the "No module named 'examples'" error.
  • Updated the package structure to include the examples folder as a valid Python module by adding an __init__.py file.

Notes

This release addresses a critical bug in the 1.0 version related to the module resolution for the quantum-sim script.

v1.0

15 Dec 17:58
e02a636
Compare
Choose a tag to compare

Quantum Attack Simulator v1.0 - Initial Release

This is the first official release of the Quantum Attack Simulator, a Python-based tool for studying the security of quantum communication systems. Version 1.0 focuses on simulating and analyzing the BB84 quantum key distribution protocol.

Key Features

  • BB84 Protocol Simulation: Explore the behavior of the BB84 protocol under different scenarios.
  • Attack Simulations:
    • Man-in-the-Middle (MITM): Analyze the impact of eavesdropping attempts on the quantum channel.
    • Photon Number Splitting (PNS): Detect and mitigate sophisticated attacks using decoy states.
  • Depolarization Noise Simulation:
    • Simulate real-world noise in quantum channels with customizable parameters.
  • Visualization Tools:
    • Error rate graphs for intensity levels (low, medium, high).
    • Observed error rates vs. expected noise thresholds.
  • Flexible CLI:
    • Run simulations with different configurations using command-line arguments.
    • Example:
      quantum-sim --attack-type MITM --depolarization-noise 1

Installation

Install and run the simulator via pip:

pip install quantum-attack-simulator
quantum-sim

Alternatively, clone the repository:

git clone https://github.com/koraydns/quantum-attack-simulator.git
cd quantum-attack-simulator
python examples/bb84_example.py

Notes

  • Educational Purpose:
    This tool is designed for learning and research purposes. It is not optimized for production use.
  • Future Features:
    More attack simulations, protocol extensions, and advanced error analysis are planned for future releases.