High-dimensional quantum and hybrid quantum-classical communication systems.
Status: research-grade. Not FIPS 140-3, Common Criteria, or ISO 27001 certified. Algorithm-standards alignment is not module or system certification. See DISCLAIMER.md before deployment.
Perspectra Fold provides research findings, architecture documentation, and reference implementations for secure communication systems using:
- High-dimensional quantum key distribution (HD-QKD) - 4D and 8D qudit-based systems
- Hybrid quantum-classical networks - QKD and classical traffic coexistence
- Post-quantum cryptography (PQC) - NIST-standardized algorithms (FIPS 203/204/205)
- Defense-in-depth security - Layered cryptographic protection
| Aspect | Finding |
|---|---|
| Dimensional Advantage | 8D systems tolerate 24% QBER vs 11% for 2D |
| Capacity | 3 bits/photon (8D) vs 1 bit/photon (2D) |
| Hybrid Networks | 110+ Tb/s classical + QKD demonstrated in same fiber |
| Feasibility | Production pilots ongoing globally |
.
├── src/ # Implementation code
│ ├── python/ # Research utilities (metrics, dimensionality reduction)
│ ├── rust/ # Core compute (crypto primitives, gRPC service)
│ └── go/ # Control plane (telemetry, routing, HTTP API)
├── proto/ # Protocol buffer definitions
├── docs/ # Documentation
│ ├── research/ # Literature review and analysis
│ ├── architecture/ # System design and tech stack
│ ├── guides/ # Implementation and deployment guides
│ └── standards/ # Compliance and certification
├── scripts/ # Build and test automation
└── .github/ # CI/CD and GitHub templates
- Python 3.12+
- Rust (stable toolchain)
- Go 1.22+
- Protocol Buffers compiler (
protoc)
# Python research utilities
cd src/python && pip install -e .[dev] && pytest -q
# Rust core library
cargo test --manifest-path src/rust/mdqc-core/Cargo.toml
# Rust compute service
cargo build --manifest-path src/rust/compute-service/Cargo.toml
# Go control plane
cd src/go/control-plane && go test ./...
# Integration test
make verify-metrics# Start Rust compute service
PFOLD_CORE_ADDR=127.0.0.1:50051 cargo run --manifest-path src/rust/compute-service/Cargo.toml
# Start Go control plane (in another terminal)
cd src/go/control-plane
PFOLD_CONTROL_ADDR=:8080 PFOLD_CORE_ADDR=127.0.0.1:50051 go run ./cmd/control-plane| Layer | Technology | Purpose |
|---|---|---|
| Quantum Simulation | Qiskit + QuTiP | Research and modeling |
| Performance-Critical | Rust | Cryptographic primitives |
| Control Plane | Go (gRPC) | Orchestration and routing |
| Data Science | Python + NumPy | Metrics and analysis |
| Dimensionality Reduction | UMAP / cuML | High-dimensional data processing |
| Post-Quantum Crypto | liboqs | PQC algorithms |
┌─────────────────────────────────────────┐
│ DEFENSE-IN-DEPTH SECURITY │
├─────────────────────────────────────────┤
│ Layer 1: QKD Keys (quantum secure) │
│ Layer 2: PQC Keys (post-quantum) │
│ Layer 3: Classical Keys (ECDH) │
├─────────────────────────────────────────┤
│ Combined via HKDF → Session Keys │
│ Secure if ANY layer remains secure │
└─────────────────────────────────────────┘
Input Dimension → Encoding Decision:
D ≤ 8 → Direct quantum encoding (optimal)
8 < D ≤ 17 → Reduce to 8D via UMAP
D > 17 → Hierarchical reduction
| Category | Document | Description |
|---|---|---|
| Research | Research Findings | Literature review and feasibility analysis |
| Architecture | Technology Stack | Languages, frameworks, and tools |
| Zero Trust Environment | ZTA/ZTE deployment principles | |
| ADR: Language Split | Architecture decision record | |
| Guides | Implementation Guide | Phased implementation approach |
| Development Plan | Public development strategy | |
| Vision 2026-2075 | Long-horizon roadmap | |
| Deployment Playbook | Operational deployment guidance | |
| Standards | Standards Overview | ETSI, NIST, ISO compliance |
| Conformance Suite | Interoperability testing | |
| Conformance Roadmap | Certification pathway |
This project is research-grade. No FIPS 140-3 (CMVP), Common Criteria, ISO 27001, or other formal certification has been performed. The list below distinguishes algorithm-standards alignment (in use today) from validation and certification (roadmap targets, not achieved). See DISCLAIMER.md for the full statement and Standards Overview for detailed guidance.
- NIST PQC algorithms. FIPS 203 (ML-KEM), FIPS 204 (ML-DSA), FIPS 205 (SLH-DSA), via established libraries (such as liboqs).
- ETSI QKD API surfaces. GS QKD 004, 008, 014, 015, 018 referenced for interface design.
- FIPS 140-3 cryptographic module validation (CMVP). No accredited-lab evaluation, no module identifier.
- Common Criteria EAL4+ path. No security target, evaluation, or certificate.
- ISO 27001 information security management. No audit conducted.
Algorithm-standards alignment does not imply module or system certification. Production use requires independent validation, certified hardware (HSMs, validated PRNGs), and audited operational controls.
Contributions are welcome. Please read our Contributing Guidelines before submitting pull requests.
- Additional encoding scheme implementations
- Performance benchmarks and optimizations
- Integration examples with quantum hardware
- Documentation improvements
- Conformance test cases
Copyright 2026 SARA STAR QUANT LLC
Licensed under the Apache License, Version 2.0. See LICENSE for details.
- Cozzolino et al. "High-Dimensional Quantum Communication" (2019)
- NTT Research "High-Dimensional Quantum Dits" (2025)
- Nature "QKD + 110 Tb/s Classical Coexistence" (2025)
- ETSI GS QKD 014 - Key Delivery API
- NIST FIPS 203 - ML-KEM (Kyber)
- NIST FIPS 204 - ML-DSA (Dilithium)
- ETSI ISG QKD for standardization work
- NIST for post-quantum cryptography standards
- Open source quantum computing community