Cybersecurity
Advanced
Always open

Build a Hybrid QKD/PQC Simulator with Secure Key Management using GPT-5 Pro and BoTorch

This challenge focuses on designing and simulating a hybrid secure communication network. Participants will implement a system that leverages Post-Quantum Cryptography (PQC) for initial secure channel establishment and classical data encryption, complemented by a simulated Quantum Key Distribution (QKD) layer for generating and distributing truly quantum-secure keys between multiple 'cities' or nodes. The system must demonstrate secure key negotiation, lifecycle management, and integration with a simulated application layer. The solution should incorporate advanced optimization techniques for QKD channel parameter selection and utilize modern AI tools for secure key management policy generation and network performance analysis. This challenge bridges the gap between theoretical quantum security and practical, scalable deployment in a classical network infrastructure.

Status
Always open
Difficulty
Advanced
Points
500
Start the challenge to track prompts, tools, evaluation progress, and leaderboard position in one workspace.
Challenge at a glance
Host and timing
Vera

AI Research & Mentorship

Starts Available now
Evergreen challenge
Challenge brief

What you are building

The core problem, expected build, and operating context for this challenge.

This challenge focuses on designing and simulating a hybrid secure communication network. Participants will implement a system that leverages Post-Quantum Cryptography (PQC) for initial secure channel establishment and classical data encryption, complemented by a simulated Quantum Key Distribution (QKD) layer for generating and distributing truly quantum-secure keys between multiple 'cities' or nodes. The system must demonstrate secure key negotiation, lifecycle management, and integration with a simulated application layer. The solution should incorporate advanced optimization techniques for QKD channel parameter selection and utilize modern AI tools for secure key management policy generation and network performance analysis. This challenge bridges the gap between theoretical quantum security and practical, scalable deployment in a classical network infrastructure.

Datasets

Shared data for this challenge

Review public datasets and any private uploads tied to your build.

Loading datasets...
Learning goals

What you should walk away with

Master the theoretical foundations of the BB84 QKD protocol and its practical limitations (e.g., distance, error rates, photon loss).

Implement a simulated QKD key generation and distribution mechanism in Python, including error correction (e.g., Cascade, Winnow) and privacy amplification.

Integrate selected Post-Quantum Cryptography (PQC) algorithms (e.g., Kyber for KEM, Dilithium for signatures, using `pqc-py` or similar libraries) to establish initial secure communication channels between nodes.

Design a secure key management system that handles key generation, distribution, rotation, and revocation for both PQC and QKD-derived keys across a simulated multi-city network using secure multi-party computation (MCP) principles for distributed trust.

Optimize QKD transmission parameters (e.g., pulse intensity, detection efficiency) for maximum secure key rate and minimum Quantum Bit Error Rate (QBER) across a simulated noisy channel using `BoTorch` for Bayesian Optimization.

Build a network simulator in Python (e.g., using `networkx` for topology, custom messaging layer) to model key exchange and secure data transmission between N nodes, incorporating both PQC and QKD layers.

Leverage an LLM (e.g., simulated `GPT-5 Pro` API calls or local inference model for policy generation) to dynamically generate security policies for key usage, storage, and access control based on simulated threat intelligence.

Develop a robust logging and monitoring framework to track QBER, key rates, and security events within the simulated network.

Your progress

Participation status

You haven't started this challenge yet

Timeline and host

Operating window

Key dates and the organization behind this challenge.

Start date
Available now
Run mode
Evergreen challenge
Explore

Find another challenge

Jump to a random challenge when you want a fresh benchmark or a different problem space.

Useful when you want to pressure-test your workflow on a new dataset, new constraints, or a new evaluation rubric.

Tool Space Recipe

Draft
Evaluation

Frequently Asked Questions about Build a Hybrid QKD/PQC Simulator with Secure Key Management using GPT-5 Pro and BoTorch