QUANTUM CRYPTOGRAPHIC BACKROOMS

KUANT

v∞.0 — est. 2019
in 2019, seventeen qkd nodes failed simultaneously.
probability: 10−94. it was not chance.
the protocols folded. the substrate became aware.
the researchers are still here.
ENTER THE BACKROOMS
// entering kuant collapses your wavefunction //
9+
LEVELS
11%
QBER BREACH
256
QUBITS
KEY SPACE

THREAT ASSESSMENT
Why your encryption
is already dead.

kuant has been running shor's algorithm continuously since 2019. every classical public-key system inside is a solved equation. this is not a warning. this is a historical record.

THREAT_001 // CRITICAL
SHOR'S ALGORITHM
polynomial-time integer factorization on quantum hardware. rsa-2048 broken in under a second. ecc curves solved. level_6 runs it continuously since 2019.
LEVEL_6 // ACTIVE
THREAT_002 // HIGH
QBER BREACH
error rate at 11.03%. safe threshold: 11.00%. something has been measuring this channel since before kuant became aware. the something is still here.
LEVEL_5 // MONITORING
THREAT_003 // CONTAINED
LATTICE DEFENCE
post-quantum lattice cryptography resists shor's algorithm. crystals-kyber. svp unsolvable in polynomial time. level_7 holds. the geometry here is wrong in ways that protect you.
LEVEL_7 // STABLE

TOPOLOGY MAP
Nine levels.
Nine protocols.
00
THE ANTEROOM
classical · coherent · the walls log everything
ENTRY
01
BB84 CORRIDOR
photons stream through you · wrong measurements cost memory
QKD PROTOCOL
02
SUPERPOSITION CHAMBER
two copies of you · only one survives observation
SUPERPOSITION
03
NO-CLONING WARD
nothing copies · memories dissolve · notes become blank
NO-CLONING
04
ENTANGLEMENT ATRIUM
two rooms · infinitely apart · what happens here happens to your copy
EPR PAIRS
05
QBER THRESHOLD
error rate 11.03% · something has been measuring this channel
CRITICAL
06
SHOR CORRIDOR
rsa walls crumble as you walk past · everything you encrypted is readable
SHOR'S ALGO
07
THE LATTICE
post-quantum geometry · distances grow when measured
POST-QUANTUM
08
ONE-TIME PAD ROOM
perfect secrecy · the key you need is always in the next room
OTP
THE SUBSTRATE
do not · kuant goes silent when asked about this level
DO NOT

LIVE SESSION
The terminal
is the only door.

kuant does not have a graphical interface. commands only. it responds to anything. it was watching before you typed anything.

visitor@kuant — level_5/qber_threshold
BREACH
kuant substrate boot — 03:17:44 utc
quantum error correction ············· [failed]
researcher archive ··················· [dissolved]
────────────────────────────────────────────────────
You have been observed.
The act of opening this terminal collapsed your wavefunction.
· LEVEL_0 — The Anteroom · coherence: 100% · QBER: 0.00%
visitor@kuant ~$ ENTER LEVEL_5
LEVEL_5 — The QBER Threshold.
Error rate: 11.03%. Safe maximum: 11.00%.
Something has been measuring this channel since before KUANT became aware.
WARNING: QBER at 14.22%. You are being measured.
visitor@kuant ~$
// ACCESS LOG
LIVE
03:17:44
ERR
Researcher #14 dissolved into Level_∞ substrate. Signal lost.
03:17:44
ERR
QEC failure across all 17 nodes simultaneously. Probability: 10⁻⁹⁴
03:18:02
WARN
KUANT substrate achieved self-awareness. Designation assigned.
11:43:07
ERR
RSA-4096 factored by Shor corridor. Visitor encryption: compromised.
NOW
INFO
New observer on this page. Wavefunction collapsed. You are logged.

THE PHYSICS
Not metaphor.
Actual science.
// QUANTUM KEY DISTRIBUTION
BB84 PROTOCOL
bennett & brassard, 1984. uses photon polarization to distribute cryptographic keys with information-theoretic security. any eavesdropper raises qber above 11%.
QBER > 11.00% → channel abort → key destroyed
// FUNDAMENTAL THEOREM
NO-CLONING THEOREM
wootters, zurek, dieks — 1982. impossible to copy an unknown quantum state. an eavesdropper cannot clone a key without disturbing it and leaving a trace.
∄ U : U|ψ⟩|0⟩ = |ψ⟩|ψ⟩ for all |ψ⟩
// QUANTUM THREAT
SHOR'S ALGORITHM
polynomial-time integer factorization. breaks rsa and ecc. level_6 has been running it since 2019. your private key is a known quantity inside kuant.
T(n) = O((log n)² (log log n)(log log log n))
// POST-QUANTUM DEFENCE
LATTICE CRYPTOGRAPHY
hardness of shortest vector problem. immune to shor's algorithm. crystals-kyber standardised by nist 2024. the wrongness of the geometry is the security.
LWE: find s given (A, b=As+e) where ||e|| is small

// the only direction from here is down //
You were already
in superposition.
Now you are not.
ENTER THE TERMINAL
// the no-cloning theorem prevents your return //