Amaravati Quantum Valley
Hackathon 2025
• Problem Statement ID – AQVH911
• Problem Statement Title- Develop a basic simulator for
Quantum Key Distribution (BB84 Protocol) to show how
secure communication can be achieved using quantum
principles
• Theme- QKD Demonstration Simulator
• PS Category- Software
• Team ID- U-1360-1
• Team Name (Registered on portal)- Tech Quantum
Tech Next-Gen QKD Simulator: Multi-Protocol with
Quantum
Attack Detection & ML Integration
Proposed Solution:
Detailed Explanation:
• Interactive QKD simulator with BB84, Decoy-State, MDI-QKD protocols
• Visualizes qubit preparation → transmission → measurement → error correction
• Simulates attacks (eavesdropping/noise)
• Observes secure key generation (SKR/QBER)
• ML integration:
• Detects anomalous qubit errors and possible eavesdropping
• Predicts optimal parameters for higher SKR How it addresses the problem:
• Supports adaptive error correction for dynamic channels • Demonstrates provably secure key
exchange resistant to quantum attacks
Innovation & Uniqueness: • Adds intelligence to protocol execution
• Combines protocol simulation + network topologies + • Maintains network topology simulations
interactive GUI + ML analytics for realistic environments
• ML-driven attack detection, adaptive error correction,
SKR optimization
• Optional extensions: CV-QKD, DI-QKD, quantum repeaters
@AQVH2025 2
Tech
Quantum
TECHNICAL APPROACH
Technologies Used:
• Programming Languages: Python
• Quantum Simulation: Qiskit
• GUI / Visualization: Tkinter / Matplotlib / Plotly
• Cryptography & Hashing: hashlib (SHA-256), XOR operations
• ML Frameworks: scikit-learn, TensorFlow / PyTorch (for attack detection & optimization)
• Optional Network Simulation: NS-3
Methodology / Process:
• Key Generation & Qubit Preparation: Alice → Bob
• Transmission with Noise / Eavesdropper Simulation
• Basis Comparison & Key Sifting
• Error Correction & Privacy Amplification
• ML-based SKR / QBER Prediction & Adaptive Error Correction
• Secure Key Visualization & Message Encryption/Decryption
• Simulation of Different Topologies: ring, mesh, satellite
@AQVH2025 3
Tech
Quantum
FEASIBILITY AND VIABILITY
Feasibility Challenges & Risks Strategies to Overcome
✅ Can be simulated using classical ⚠️ Real QKD hardware is costly & 🛠️ Use web-based simulators +
systems & IBM Quantum API limited optional IBM API demo
✅ Low-cost, accessible for ⚠️ Simulations can’t capture all 🛠️ Add modular upgrades (BB84 →
education & research real-world noise B92 → E91)
✅ Useful for awareness, training & ⚠️ Quantum concepts are complex 🛠️ Step-by-step visualization &
innovation for beginners interactive demos
✅ High potential in universities, ⚠️ Users may confuse demo with
🛠️ Clear disclaimers + learning focus
startups & defense training real encryption
@AQVH2025 4
Tech
Quantum
IMPACT AND BENEFITS
🎯Practical Applications
Government / Defense Use
Simulate secure military communications over noisy/long-distance
channels. 🌍 Benefits of the Solution
Show resilience under eavesdropper attacks. Social → protects privacy and builds trust in
Banking & Finance digital communication.
Model bank-to-bank secure key exchange over fiber networks. Economic → secures financial transactions,
Demonstrate how QKD resists classical + quantum computer reduces fraud, and enables quantum-driven
attacks. industries.
Satellite-Based QKD Environmental → enables energy-efficient
Apply your sim to space-ground communication (like ISRO’s QKD quantum networks compared to heavy
experiments). cryptographic computations.
Very few simulators add this, so it’s a strong novelty. Long-term Security → future-proof against
Telecom Integration quantum computer attacks.
QKD integrated into 5G/6G backbone networks.
Your sim can test how QKD coexists with classical traffic.
@AQVH2025 5
Tech
Quantum
RESEARCH AND REFERENCES
References:
• Core Protocol TheoryC. H. Bennett, G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,”
Theoretical Computer Science, 1984 (BB84 protocol)H.-K. Lo, M. Curty, B. Qi, “Measurement-device-independent
quantum key distribution,” Phys. Rev. Lett. 108, 130503 (2012) (MDI-QKD)
• Key Rate and Security LimitsS. Pirandola et al., “Fundamental limits of repeaterless quantum communications,” Nature
Communications 8, 15043 (2017). (PLOB bound)M. Lucamarini et al., “Overcoming the rate–distance limit of quantum
key distribution without quantum repeaters,” Nature 557, 400–403 (2018). (Twin Field QKD)
Software and Simulation References:
• QKDNetSim (v2.0) — www.qkdnetsim.info
• QuNetSim — qunetsim.readthedocs.io
• SimulaQron — simulaqron.org
Security and Finite-Key Analysis:
V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, et al., “The security of practical quantum key distribution,” Rev. Mod.
Phys. 81, 1301 (2009)
M. Tomamichel, C. C. W. Lim, N. Gisin, R. Renner, “Tight finite-key analysis for quantum cryptography,” Nature
Communications 3, 634 (2012)
@AQVH2025 6