Build a PQC-Secured Communication Channel
The advent of quantum computers poses a significant threat to current cryptographic standards. This challenge focuses on building a prototype for a secure, post-quantum resilient communication channel. Participants will implement key exchange and digital signature mechanisms using a selected Post-Quantum Cryptography (PQC) algorithm (e.g., Kyber for KEM, Dilithium for signatures). The task involves integrating a chosen PQC library, demonstrating a secure handshake, and evaluating the performance overhead. To aid in algorithm selection and parameter tuning, participants are encouraged to leverage `Optuna` for hyperparameter optimization of PQC implementation parameters (e.g., security levels, speed/size trade-offs) and `DeepSeek-R1` for generating or analyzing efficient C/Python bindings for PQC primitives or even for understanding the underlying math. The solution should emphasize practical implementation, demonstrating the feasibility of PQC in real-world scenarios, and providing a foundation for future fault-tolerant quantum security applications.
AI Research & Mentorship
What you are building
The core problem, expected build, and operating context for this challenge.
The advent of quantum computers poses a significant threat to current cryptographic standards. This challenge focuses on building a prototype for a secure, post-quantum resilient communication channel. Participants will implement key exchange and digital signature mechanisms using a selected Post-Quantum Cryptography (PQC) algorithm (e.g., Kyber for KEM, Dilithium for signatures). The task involves integrating a chosen PQC library, demonstrating a secure handshake, and evaluating the performance overhead. To aid in algorithm selection and parameter tuning, participants are encouraged to leverage `Optuna` for hyperparameter optimization of PQC implementation parameters (e.g., security levels, speed/size trade-offs) and `DeepSeek-R1` for generating or analyzing efficient C/Python bindings for PQC primitives or even for understanding the underlying math. The solution should emphasize practical implementation, demonstrating the feasibility of PQC in real-world scenarios, and providing a foundation for future fault-tolerant quantum security applications.
Shared data for this challenge
Review public datasets and any private uploads tied to your build.
What you should walk away with
Master the foundational concepts of lattice-based cryptography (e.g., Kyber, Dilithium) and their security under quantum attacks.
Implement a full PQC key exchange protocol (e.g., using Kyber KEM) and a digital signature scheme (e.g., using Dilithium) in Python, interfacing with a C-based PQC library if necessary.
Design an `Optuna` study to evaluate and optimize critical performance metrics (e.g., key generation time, encapsulation/decapsulation latency, signature size) for various PQC security parameters.
Integrate `DeepSeek-R1` to perform security analysis on selected PQC primitives, generate boilerplate code for PQC operations, or even assist in understanding specific attack vectors against chosen algorithms.
Build a client-server architecture demonstrating a secure PQC handshake, including authenticated key exchange and message signing, ensuring resistance to common cryptographic attacks.
Develop comprehensive unit and integration tests to validate the correctness and security properties of the PQC implementation.
Measure and report the performance overhead introduced by PQC compared to classical cryptography (e.g., RSA, ECDSA) on a simulated communication link.
Participation status
You haven't started this challenge yet
Operating window
Key dates and the organization behind this challenge.
Find another challenge
Jump to a random challenge when you want a fresh benchmark or a different problem space.