Skip to content

Commit 4573f9b

Browse files
authored
Add files via upload
1 parent c27198c commit 4573f9b

File tree

10 files changed

+263
-2
lines changed

10 files changed

+263
-2
lines changed

CITATION.cff

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
cff-version: 1.2.0
2+
message: "If you use QD-RSA in your research, please cite the following metadata."
3+
title: "Quantum-Disruptive RSA (QD-RSA): A Post-Quantum Cryptographic Framework"
4+
version: "1.1"
5+
doi: "10.5281/zenodo.TODO" # Replace with real DOI once published
6+
date-released: 2024-05-12
7+
authors:
8+
- family-names: Valamontes
9+
given-names: Antonis
10+
affiliation: Kapodistrian Academy of Science
11+
orcid: https://orcid.org/0000-0002-1825-0097
12+
license: "Other (Open, Non-Commercial)"
13+
repository-code: "https://github.com/KapodistrianCrypto/QD-RSA-Challenge"
14+
keywords:
15+
- quantum cryptography
16+
- RSA
17+
- post-quantum
18+
- Grover
19+
- Shor
20+
- cryptanalysis

ISSUES.md

Lines changed: 47 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
# 🔓 Open Challenge: Break QD-RSA v1.1
2+
3+
**Welcome to the official QD-RSA cryptanalysis challenge.**
4+
This pinned issue invites cryptographers, security researchers, and quantum computing experts to rigorously analyze and test the QD-RSA v1.1 system.
5+
6+
## 📌 Objective
7+
8+
We challenge the community to find any cryptographic weakness, inversion strategy, or implementation flaw in **any of the following layers**:
9+
10+
### 🧩 1. Masking Function:
11+
Φₛ(x) = x · sin((π + εₛ) · x) mod n
12+
- Can it be approximated or reversed without knowing εₛ?
13+
- Are FFT or lattice-based inversion strategies effective?
14+
15+
### 🧬 2. Trap Function:
16+
Ξₛ(x) = (x + r)² · cosh(γ(x + r)) · tan⁻¹(δ(x + r)) mod n
17+
- Can symbolic regression, surrogate modeling, or QML defeat this layer?
18+
19+
### 🔐 3. Symbolic Hash:
20+
𝓘ₛ*(x) = SHA3-256 ( ∑ xᵏ / bᵏ for k = 1 to Nₛ )
21+
- Can Grover-enhanced attacks recover x or forge a preimage?
22+
- Is symbolic structure leaking through the hash?
23+
24+
## 📥 Submission Format
25+
26+
Please provide:
27+
- A description of your method
28+
- Code, proof sketch, or attack path
29+
- Runtime estimates or complexity bounds
30+
- Any limitations or assumptions
31+
32+
## 💬 Guidelines
33+
34+
- Fork this repo to submit alternate branches or experiments.
35+
- Tag all reports with `cryptanalysis`.
36+
- Discussion, reproducibility, and respectful collaboration are encouraged.
37+
- Credited contributions will be featured in future versions.
38+
39+
## 🧠 Reference Materials
40+
41+
- Cryptanalysis Challenge Brief (PDF)
42+
- Version Declaration v1.1
43+
- Reference Implementation (Python, C, C#)
44+
45+
## 📬 Contact
46+
47+
For confidential disclosures: [email protected]

QD_RSA_NONCOMMERCIAL_LICENSE.txt

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
2+
Copyright © 2024 Kapodistrian Academy of Science
3+
4+
Permission is hereby granted to any person obtaining a copy of this cryptographic specification, associated documentation files, or reference implementation (the “Software”), to use, copy, modify, and distribute the Software for academic, educational, and research purposes, subject to the following conditions:
5+
6+
1. The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
7+
8+
2. Commercial use, including but not limited to selling, licensing, sublicensing, or integrating the Software or derivatives into proprietary systems, is strictly prohibited without prior written consent from the Kapodistrian Academy of Science.
9+
10+
3. The Software is provided “as is,” without warranty of any kind, express or implied, including but not limited to the warranties of merchantability, fitness for a particular purpose, or noninfringement. In no event shall the authors or copyright holders be liable for any claim, damages, or other liability, whether in an action of contract, tort, or otherwise, arising from, out of, or in connection with the Software or the use or other dealings in the Software.
11+
12+
This license is modeled after Creative Commons Attribution-NonCommercial 4.0 (CC BY-NC 4.0) and is enforceable under international copyright law.
13+
14+
For inquiries regarding commercial licensing, contact:
15+

README.md

Lines changed: 86 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,86 @@
1-
# QD-RSA-Challenge
2-
QD-RSA-Challenge
1+
# QD-RSA v1.1: Quantum-Disruptive RSA
2+
3+
This repository contains the public specification, challenge brief, and reference implementation for QD-RSA v1.1—a quantum-resilient RSA enhancement.
4+
5+
## Overview
6+
QD-RSA introduces three entropy-hardened symbolic transformations:
7+
- Φₛ(x): Session-specific sine-masked domain encoding
8+
- Ξₛ(x): Entropy-shifted non-convex trap function
9+
- 𝓘ₛ*(x): SHA3-wrapped symbolic hash
10+
11+
## Files
12+
- `QD_RSA_Cryptanalysis_Challenge_Brief.pdf` – Public audit and attack challenge brief
13+
- `QD_RSA_v1.1_Version_Declaration.pdf` – Formal versioning declaration
14+
- `LICENSE.txt` – Non-commercial use terms
15+
- `/reference_implementation/` – Python modules for demonstration and attack testing
16+
17+
## License
18+
This repository is distributed under a non-commercial academic research license.
19+
See LICENSE.txt for details.
20+
21+
## Contact
22+
23+
24+
25+
# 🔓 Open Challenge: Break QD-RSA v1.1
26+
27+
**Welcome to the official QD-RSA cryptanalysis challenge.**
28+
This pinned issue invites cryptographers, security researchers, and quantum computing experts to rigorously analyze and test the QD-RSA v1.1 system.
29+
30+
## 📌 Objective
31+
32+
We challenge the community to find any cryptographic weakness, inversion strategy, or implementation flaw in **any of the following layers**:
33+
34+
### 🧩 1. Masking Function:
35+
Φₛ(x) = x · sin((π + εₛ) · x) mod n
36+
- Can it be approximated or reversed without knowing εₛ?
37+
- Are FFT or lattice-based inversion strategies effective?
38+
39+
### 🧬 2. Trap Function:
40+
Ξₛ(x) = (x + r)² · cosh(γ(x + r)) · tan⁻¹(δ(x + r)) mod n
41+
- Can symbolic regression, surrogate modeling, or QML defeat this layer?
42+
43+
### 🔐 3. Symbolic Hash:
44+
𝓘ₛ*(x) = SHA3-256 ( ∑ xᵏ / bᵏ for k = 1 to Nₛ )
45+
- Can Grover-enhanced attacks recover x or forge a preimage?
46+
- Is symbolic structure leaking through the hash?
47+
48+
## 📥 Submission Format
49+
50+
Please provide:
51+
- A description of your method
52+
- Code, proof sketch, or attack path
53+
- Runtime estimates or complexity bounds
54+
- Any limitations or assumptions
55+
56+
## 💬 Guidelines
57+
58+
- Fork this repo to submit alternate branches or experiments.
59+
- Tag all reports with `cryptanalysis`.
60+
- Discussion, reproducibility, and respectful collaboration are encouraged.
61+
- Credited contributions will be featured in future versions.
62+
63+
## 🧠 Reference Materials
64+
65+
- Cryptanalysis Challenge Brief (PDF)
66+
- Version Declaration v1.1
67+
- Reference Implementation (Python, C, C#)
68+
69+
## 📬 Contact
70+
71+
For confidential disclosures: [email protected]
72+
73+
74+
## 🔐 FAQ: Does QD-RSA contain any government-access mechanism or DoD backdoor?
75+
76+
**No.** QD-RSA does not contain any mechanism that would allow the Department of Defense (DoD), any governmental body, or any privileged party to reverse, bypass, or decrypt communications without possession of the correct private key and session-specific entropy parameters.
77+
78+
Specifically:
79+
80+
- QD-RSA includes **no master key**, **no escrow system**, **no decryption oracle**, and **no entropy bias**.
81+
- All entropy values (`εₛ`, `r`) are derived per session and are non-recoverable without explicit knowledge.
82+
- The system is built according to open cryptographic principles and does not include any privileged override mechanism.
83+
84+
**Design Philosophy:** QD-RSA is engineered for public, trustless, and post-quantum-resilient encryption. It is meant to secure communications globally without centralized control or built-in surveillance vectors.
85+
86+
*Note:* National security protocols that require access to encrypted content should implement key management policies externally (e.g., through operational key escrow or secure key distribution), not by altering the QD-RSA algorithm itself.

RELEASE_NOTES.md

Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
# 🚀 QD-RSA v1.1 – Initial Cryptanalysis Challenge Release
2+
3+
We are proud to announce the **v1.1 release** of **Quantum-Disruptive RSA (QD-RSA)**, a symbolic enhancement of RSA designed to resist quantum adversaries using Shor’s algorithm, Grover’s algorithm, and quantum annealing.
4+
5+
---
6+
7+
## 🔐 Cryptographic Fixes and Features
8+
9+
-**Φₛ(x)**: Session-specific irrational masking
10+
Φₛ(x) = x · sin((π + εₛ) · x) mod n
11+
Prevents inverse-matching and FFT attacks through session entropy.
12+
13+
-**Ξₛ(x)**: Entropy-shifted trap function
14+
Ξₛ(x) = (x + r)² · cosh(γ(x + r)) · tan⁻¹(δ(x + r)) mod n
15+
Designed to defeat surrogate inversion via regression or QML.
16+
17+
-**𝓘ₛ*(x)**: Post-quantum symbolic hash
18+
𝓘ₛ*(x) = SHA3-256 ( ∑ xᵏ / bᵏ for k = 1 to Nₛ )
19+
Grover-resistant via symbolic series wrapped in SHA3-256.
20+
21+
---
22+
23+
## 📁 What’s Included
24+
25+
- 🧪 Reference implementation: Python, C, and C# versions
26+
- 🧪 Minimal tests for symbolic layer validation
27+
- 📄 Cryptanalysis Challenge Brief (PDF)
28+
- 📜 Version Declaration v1.1 (PDF)
29+
- ⚖️ Non-Commercial License (LICENSE.txt)
30+
- 🗂 .zenodo.json for Zenodo DOI automation
31+
32+
---
33+
34+
## 📢 Open Challenge (Pinned Issue)
35+
36+
We're inviting the cryptographic community to break or bypass any part of the QD-RSA design under controlled assumptions.
37+
See the pinned GitHub issue: “🔓 Open Challenge: Break QD-RSA v1.1”
38+
39+
---
40+
41+
## 📬 Contact
42+
43+
For confidential analysis results or disclosures:
44+

reference_implementation/__init__.py

Whitespace-only changes.
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
// QD-RSA Core Placeholder in C
2+
#include <math.h>
3+
#include <stdint.h>
4+
5+
uint64_t phi_s(uint64_t x, double eps_s, uint64_t n) {
6+
double kappa_s = M_PI + eps_s;
7+
return (uint64_t)(x * sin(kappa_s * x)) % n;
8+
}
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
// QD-RSA Core Placeholder in C#
2+
using System;
3+
4+
public class QDRSA {
5+
public static ulong PhiS(double x, double epsS, ulong n) {
6+
double kappaS = Math.PI + epsS;
7+
return (ulong)(x * Math.Sin(kappaS * x)) % n;
8+
}
9+
}
Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
# QD-RSA Core Functions (Python)
2+
import math
3+
import hashlib
4+
import hmac
5+
6+
def phi_s(x, eps_s, n):
7+
kappa_s = math.pi + eps_s
8+
return int(x * math.sin(kappa_s * x)) % n
9+
10+
def xi_s(x, gamma, delta, r, n):
11+
x_r = x + r
12+
return int((x_r**2) * math.cosh(gamma * x_r) * math.atan(delta * x_r)) % n
13+
14+
def i_star(x, N_s=20, b=10):
15+
acc = sum((x**k) / (b**k) for k in range(1, N_s + 1))
16+
return hashlib.sha3_256(str(acc).encode()).hexdigest()
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
# Basic tests for QD-RSA core
2+
from qdrsa_core import phi_s, xi_s, i_star
3+
4+
def test_phi():
5+
assert isinstance(phi_s(5, 0.00031415, 997), int)
6+
7+
def test_xi():
8+
assert isinstance(xi_s(7, 1.3, 0.8, 2, 997), int)
9+
10+
def test_hash():
11+
h = i_star(9)
12+
assert len(h) == 64 and all(c in '0123456789abcdef' for c in h)
13+
14+
if __name__ == "__main__":
15+
test_phi()
16+
test_xi()
17+
test_hash()
18+
print("All QD-RSA core tests passed.")

0 commit comments

Comments
 (0)