An open API service providing repository metadata for many open source software ecosystems.

GitHub topics: quantum-encryption

Ciao006/Article-Summary-Generator

This repository hosts the Article Summary Generator, a Streamlit app that simplifies article summarization and Telegram posting. 🤖📦 Users can easily search for articles and receive concise summaries, enhancing their research experience.

Language: Python - Size: 8.79 KB - Last synced at: 1 day ago - Pushed at: 1 day ago - Stars: 0 - Forks: 0

ProjectZeroDays/Project-Red-Sword

Defense Intelligence Agency's Special Access Program For Cyber Intelligence, A National Security Asset | Project Red Sword Deploys an AI-Operated, Offensive & Defensive Cyber Espionage & State Sponsored Attack Framework With Automated Red, Blue & Purple Team, Auditing & Reporting Capabilties.

Language: Python - Size: 22.1 MB - Last synced at: 2 days ago - Pushed at: 5 months ago - Stars: 9 - Forks: 3

dxns-hub/Lumina

A decentralized AGI architecture

Size: 19.5 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

ABHIJITH-C777/quantum-encryption

Quantum Resilient Encryption

Language: Python - Size: 29.3 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

jtrag/TUPT-Cryptography

The TUPT Cryptography Library is a Python-based, quantum-resistant encryption system implementing the Trageser Universal Pattern Transform (TUPT) for secure messaging.

Language: Python - Size: 22.5 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 1 - Forks: 0

MuonRay/Quantum-Encryption-of-Images-using-Bitwise-XOR-and-QRNG

Article here: http://muonray.blogspot.com/2022/02/quantum-encryption-of-images-in-python.html The definition of image encryption used here is an extension of data encryption in general: using the bitwise XOR operation of the original image pixels and the random key image pixels, with the key image being either a pseudo-random stream cipher or the quantum random stream cipher or anti-correlated entangled information shared over a secure channel. In either case we Perform bitwise XOR operation on the encrypted image and the key image. It can be seen from the image encryption and decryption that they are all the same operation. According to the above bitwise XOR operation, we assume: xor(a,b)=c You can get: xor(c,b)=a Or: xor(c,a)=b In summary, we assume that a is the original image data and b is the key, then c calculated by xor(a,c) is the encrypted ciphertext. This is a simple summary of the encryption and decryption process as used in the coding in this repository. Encryption process: Perform a bitwise XOR operation on the image a and the key b to complete the encryption and obtain the ciphertext c. Decryption process: Perform a bitwise XOR operation on the ciphertext c and the key b, complete the decryption, and get the image a. We can use our quantum random numbers generator in 2 ways to create our image encryption key: (1) as a random number generator seed source (2) using the random superposition of the H and V modes We can also use the shared set of correlated images, captured using the single CCD, from our entangled photon source with Alice getting one half and Bob getting the anti-correlated half. This provides the perfect key, with the quantum images shared over a separate channel hidden from the encrypted classical images. The file exchange channel is 2 way: Alice can use Her key to encrypt the image, Bob can use His key to decrypt the image OR Bob can use His key to encrypt the image, Alice can use Her key to decrypt the image. The XOR Cipher in this use can also be extended as a component in more complex overlay network ciphers if need be however for computational efficiency it is not necessary. It is just as effectual to have 1 quantum cipher as many, so in effect the system is completely hidden, by virtue of hidden variables, and is encrypted in an information condensate.

Language: Python - Size: 3.67 MB - Last synced at: 3 months ago - Pushed at: about 3 years ago - Stars: 10 - Forks: 1

Galactic-Code-Developers/radar_dataset_astyx Fork of under-the-radar/radar_dataset_astyx

Astyx Radar Dataset

Size: 328 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 0 - Forks: 1

sunilRedy/QuantumResilientEncryptionFramework

A quantum-resilient encryption framework designed to provide secure, scalable, and efficient cryptographic solutions in the face of quantum computing threats. Featuring adaptive key management, secure communication protocols, and quantum-resistant data integrity.

Size: 3.91 KB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0

sunilRedy/Quantum-Resilient-Encryption-Framework

A quantum-resilient encryption framework designed to provide secure, scalable, and efficient cryptographic solutions in the face of quantum computing threats. Featuring adaptive key management, secure communication protocols, and quantum-resistant data integrity.

Language: C++ - Size: 53.7 KB - Last synced at: 7 months ago - Pushed at: 7 months ago - Stars: 0 - Forks: 0

BomBe1939/Basic-implementation-of-a-quantum-key-exchange-protocol-using-Qiskit

This project demonstrates a basic implementation of the BB84 quantum key distribution protocol using Qiskit. The code simulates the process of Alice preparing quantum bits (qubits) with random bases and sending them to Bob, who then measures them with his own randomly chosen bases.

Language: Python - Size: 36.1 KB - Last synced at: 10 months ago - Pushed at: 10 months ago - Stars: 1 - Forks: 0

camitava0321/quantumComputing

Updated and most comprehensive Repository On Quantum Computing Resources. It contains all the material I use for my research on Quantum Computing for Both Theories and Codes - I update it regularly.

Language: Jupyter Notebook - Size: 22.7 MB - Last synced at: 11 months ago - Pushed at: over 1 year ago - Stars: 21 - Forks: 9

Related Keywords
quantum-encryption 11 python 3 quantum-computing 2 secure-data-sharing 2 scalable-cryptography 2 quantum-resilient-security 2 quantum-entanglement-communication 2 quantum-blockchain-integration 2 post-quantum-cryptography 2 multi-factor-authentication 2 data-integrity-verification 2 adaptive-key-management 2 quantum-entanglement 2 quantum-cryptography 2 encryption 2 ai 2 bitwise-xor 2 muonray 2 api 2 physics 2 quantum-programming-language 1 langchain 1 langchain-ollama 1 langgraph 1 medium 1 space-security 1 hypersonic-threats 1 fractal-radar 1 defensetech 1 xor-cipher 1 ruby 1 quantum-decryption 1 quantum 1 image-processing 1 image-encryption 1 quantum-resistant-security 1 quantum-resistant-cryptosystems 1 quantum-mechanics 1 quantum-machine-learning 1 quantum-information 1 quantum-error-correction 1 quantum-circuits 1 quantum-chemistry 1 quantum-applications 1 quantum-annealing 1 quantum-algorithms 1 quantum-ai 1 simulation 1 quantum-key-distribution 1 quantum-circuit 1 qiskit 1 cryptography 1 bb84-protocol 1 article 1 chatgpt 1 quantum-resistant-crypto 1 artificial-neural-networks 1 summarizer 1 agi 1 advanced-artificial-intelligence 1 us-cyber-command 1 state-sponsored-attacks 1 nsa 1 national-security-clearance-level-confidential 1 national-security 1 infomation-operations-command 1 dia 1 classified 1 cia 1 center-for-cyber-intelligence 1 ai-offensive-security 1 ai-defensive-intelligence 1 above-top-secret 1 wikipedia 1 vite 1 quantum-resistant 1 python-libraries 1 signature 1 secrets-management 1 research-paper 1 quantum-safe 1 serperapi 1 p2p-network 1 ntru 1 hdd 1 filesharing 1 encryption-decryption 1 dilithium 1 cybersecurity 1 neural-networks 1 summarization 1 emergence 1 decentralized 1 cognitive-science 1