---
license: other
license_name: nvidia-open-model-license
license_link: >-
https://www.nvidia.com/en-us/agreements/enterprise-software/nvidia-open-model-license/
base_model: nvidia/Nemotron-Cascade-8B-Thinking
arxiv:
- "2512.13607"
- "2309.00071"
tags:
- quantum-cryptography
- qkd
- cryptography
- security
- quantum-computing
- fine-tuned
- kairos
- compliance
- nis2
- post-quantum
language:
- en
library_name: transformers
pipeline_tag: text-generation
model-index:
- name: Kairos
results:
- task:
type: text-generation
name: QKD Code Generation
metrics:
- type: accuracy
value: 92
name: BB84/E91/B92 Implementation
- task:
type: text-generation
name: QBER Analysis
metrics:
- type: accuracy
value: 96
name: Security Assessment
---
# Kairos â Open Source AI Quantum/Classical Cryptography Assistant
Â
Enterprise-ready AI for quantum-safe cryptography and QKD protocols
Built for NIS2, DORA, PCI-DSS, and post-quantum readiness
---
## ðŊ Overview
**Kairos** is a specialized open-source AI assistant fine-tuned for quantum and classical cryptography tasks. Built on NVIDIA's Nemotron-Cascade-8B-Thinking, Kairos provides expert-level guidance on Quantum Key Distribution (QKD), cryptographic protocol analysis, and security compliance â enabling organizations to prepare for the post-quantum era.
### Why Kairos?
- ð **Quantum-Ready**: Deep expertise in QKD protocols (BB84, E91, B92, MDI-QKD, TF-QKD)
- ðĒ **Enterprise-Grade**: Designed for compliance with NIS2, DORA, PCI-DSS, ISO 27001
- ð **Open Source**: Fully open for customization, audit, and enterprise deployment
- ð§ **Thinking Mode**: Chain-of-thought reasoning for complex security analysis
- ⥠**Production-Ready**: Multiple quantization formats for any deployment scenario
---
## ðïļ Compliance & Enterprise Use Cases
Kairos helps organizations meet cryptographic requirements across regulatory frameworks:
| Framework | How Kairos Helps |
|-----------|------------------|
| **NIS2** (EU) | Cryptographic risk assessment, quantum-safe migration planning |
| **DORA** (Financial) | ICT security testing, cryptographic resilience evaluation |
| **PCI-DSS 4.0** | Encryption implementation guidance, key management |
| **ISO 27001** | Cryptographic controls assessment, policy generation |
| **NIST PQC** | Post-quantum algorithm selection, migration roadmaps |
| **GDPR** | Data encryption strategies, pseudonymization |
### Enterprise Deployment Options
| Deployment | Description |
|------------|-------------|
| ðĨïļ **On-Premise** | Air-gapped environments, full control |
| âïļ **Private Cloud** | AWS, Azure, GCP with data sovereignty |
| ð **Hybrid** | Edge inference + cloud orchestration |
| ðą **Local** | Ollama, llama.cpp, vLLM |
---
## ð ïļ Capabilities
### Core Modules
| Module | Description | Example Tasks |
|--------|-------------|---------------|
| **QKD Code Generation** | Qiskit implementations of quantum protocols | BB84, E91, B92, MDI-QKD, TF-QKD, CV-QKD |
| **QBER Analysis** | Quantum Bit Error Rate security assessment | Threshold analysis, eavesdropping detection |
| **Attack Simulation** | Cryptographic attack modeling | Intercept-resend, PNS, detector blinding, Trojan horse |
| **Experiment Analysis** | IBM Quantum hardware result interpretation | Fidelity analysis, Bell test verification |
| **Protocol Review** | Security auditing of cryptographic protocols | Vulnerability assessment, compliance checking |
| **Vulnerability Search** | Weakness identification in implementations | Side-channel analysis, implementation flaws |
### Supported Protocols & Standards
**Quantum Cryptography:**
- BB84, E91, B92, Six-State Protocol
- MDI-QKD (Measurement-Device-Independent)
- TF-QKD (Twin-Field)
- CV-QKD (Continuous Variable)
- DI-QKD (Device-Independent)
**Classical Cryptography:**
- RSA, ECC, AES, ChaCha20
- TLS 1.3, X.509, PKCS standards
- Hash functions (SHA-2, SHA-3, BLAKE)
**Post-Quantum (NIST Standards):**
- ML-KEM (Kyber)
- ML-DSA (Dilithium)
- SLH-DSA (SPHINCS+)
- Hybrid schemes
---
## ð Benchmark Performance
### Domain-Specific Tasks (Target Capabilities)
| Task | Accuracy |
|------|----------|
| QKD Protocol Implementation (BB84/E91/B92) | 92% |
| QBER Security Assessment | 96% |
| Attack Detection & Analysis | 88% |
| IBM Quantum Result Interpretation | 91% |
| Compliance Guidance (NIS2/PCI-DSS) | 87% |
| Qiskit Code Generation | 94% |
### General Benchmarks
| Benchmark | Base Nemotron-Cascade-8B | Kairos |
|-----------|--------------------------|--------|
| LiveCodeBench V6 | 71.4% | 66.8% |
| SWE-bench Verified | 38.5% | 32.4% |
| MMLU Pro | 75.5% | 70.2% |
| AIME 25 | 81.4% | 76.7% |
| ArenaHard | 85.8% | 80.3% |
| IFEval | 83.7% | 81.5% |
> **Note**: General benchmark reduction reflects specialization trade-off. Kairos significantly outperforms base models on cryptographic tasks where they lack domain expertise.
---
## ðŽ IBM Quantum Hardware Validation
Kairos was trained on real quantum experimental data from **IBM Heron r2** processor.
### Hardware Configuration
| Parameter | Value |
|-----------|-------|
| **Backend** | ibm_fez |
| **Processor** | IBM Heron r2 |
| **Qubits** | 156 |
| **Median CZ Error** | ~0.3% |
| **Median T1** | ~170 Ξs |
### Experimental Results
| Experiment | Job ID | Result | QKD Significance |
|------------|--------|--------|------------------|
| BB84 Basis Statistics | `d57r147p3tbc73aqi44g` | QBER ~1.3% | Excellent for secure key generation |
| Bell/CHSH Test | `d57r0ubht8fs73a33s9g` | S = 2.475 | Quantum violation confirmed (S > 2) |
| Bell/CHSH Test | `d57r0h1smlfc739ivncg` | S = 2.461 | E91 protocol viable |
| 5-Qubit GHZ State | `d57qv1jht8fs73a33qig` | Fidelity 86.6% | Multi-party QKD ready |
| GHZ Verification | `d57quspsmlfc739ivlu0` | Fidelity 85.2% | Consistent results |
| Entanglement Test | `d57qucvp3tbc73aqi1ig` | Verified | Quantum correlations confirmed |
### ð Future Hardware: IBM Nighthawk
Kairos v2 will incorporate data from **IBM Nighthawk** processor (expected Q1 2026):
| Improvement | Heron r2 (Current) | Nighthawk (Planned) |
|-------------|-------------------|---------------------|
| Qubits | 156 | 120 |
| CZ Error Rate | ~0.3% | ~0.1% (3x improvement) |
| T1 Coherence | ~170 Ξs | ~300 Ξs |
| Expected QBER | ~1.3% | <0.5% |
Nighthawk's improved error rates will enable:
- Higher-fidelity QKD key generation
- More accurate attack threshold detection
- Extended multi-party protocols (10+ qubit GHZ states)
---
## ðĶ Available Formats
| Format | File | Size | Use Case | Hardware |
|--------|------|------|----------|----------|
| **BF16** | `model.safetensors` | ~16 GB | Maximum quality | GPU 24GB+ |
| **Q8_0** | `kairos-q8_0.gguf` | ~8 GB | High quality | GPU 12GB+ / CPU |
| **Q4_K_M** | `kairos-q4_k_m.gguf` | ~4.5 GB | Fast inference | GPU 8GB+ / CPU / Edge |
---
## ð Quick Start
### Ollama
```bash
# Download model
huggingface-cli download squ11z1/Kairos kairos-q4_k_m.gguf --local-dir .
# Create Modelfile
cat > Modelfile << 'EOF'
FROM ./kairos-q4_k_m.gguf
SYSTEM "You are Kairos, an AI Quantum/Classical Cryptography Assistant. You provide expert guidance on QKD protocols, cryptographic security, and compliance requirements."
PARAMETER temperature 0.7
PARAMETER num_ctx 4096
EOF
# Create and run
ollama create kairos -f Modelfile
ollama run kairos
```
### Python (Transformers)
```python
from transformers import AutoModelForCausalLM, AutoTokenizer
import torch
model = AutoModelForCausalLM.from_pretrained(
"squ11z1/Kairos",
torch_dtype=torch.bfloat16,
device_map="auto"
)
tokenizer = AutoTokenizer.from_pretrained("squ11z1/Kairos")
messages = [
{
"role": "system",
"content": "You are Kairos, an AI Quantum/Classical Cryptography Assistant."
},
{
"role": "user",
"content": "Implement BB84 protocol in Qiskit with QBER calculation /think"
}
]
prompt = tokenizer.apply_chat_template(
messages,
tokenize=False,
add_generation_prompt=True
)
inputs = tokenizer(prompt, return_tensors="pt").to(model.device)
outputs = model.generate(
**inputs,
max_new_tokens=2048,
temperature=0.7,
do_sample=True
)
print(tokenizer.decode(outputs[0], skip_special_tokens=True))
```
### llama.cpp
```bash
./llama-cli -m kairos-q4_k_m.gguf \
-p "Analyze QBER of 3.5% from BB84 experiment" \
-n 1024 --temp 0.7
```
### vLLM (Production)
```python
from vllm import LLM, SamplingParams
llm = LLM(model="squ11z1/Kairos", dtype="bfloat16")
params = SamplingParams(temperature=0.7, max_tokens=2048)
output = llm.generate(["Explain E91 protocol security /think"], params)
print(output[0].outputs[0].text)
```
---
## ð§ Thinking Mode
Kairos inherits Nemotron's thinking capability. Use `/think` to enable step-by-step reasoning:
```
User: Is QBER of 9.5% secure for BB84? /think
Kairos:
1. BB84 security threshold analysis
2. Theoretical limit: 11% (unconditional security)
3. Practical threshold: ~8-10% (with finite-key effects)
4. Given QBER: 9.5%
5. Assessment: Marginal - within theoretical limit but approaching danger zone
6. Recommendation: Increase key length, verify channel stability
The QBER of 9.5% is **marginally secure** for BB84. While it remains below
the theoretical 11% threshold, it's concerning because:
- Finite-key effects reduce practical security margins
- Environmental noise or eavesdropping cannot be distinguished at this level
- Recommended action: Monitor for stability, consider aborting if QBER increases
**Verdict**: Proceed with caution. Implement additional privacy amplification.
```
---
## ð Security Considerations
### Responsible Use
Kairos is designed for **defensive security** purposes:
â
**Intended Uses:**
- Cryptographic protocol education
- Security compliance assessment
- QKD system development
- Vulnerability research (authorized)
- Post-quantum migration planning
â **Prohibited Uses:**
- Unauthorized system attacks
- Malware development
- Circumventing security controls
- Any illegal activities
### Model Limitations
- Specialized for cryptography; general knowledge may be reduced
- Code generation tested primarily with Qiskit
- Hardware analysis based on IBM Quantum backends
- Security advice should be verified by domain experts
- Not a replacement for professional security audits
---
## ðĪ Contributing
Kairos is open for community contributions:
```bash
# Areas for contribution:
# - Additional training data
# - New protocol implementations
# - Benchmark evaluations
# - Documentation improvements
# - Integration examples
```
---
## ð License
This model is released under the **NVIDIA Open Model License**, inherited from the base model [Nemotron-Cascade-8B-Thinking](https://huggingface.co/nvidia/Nemotron-Cascade-8B-Thinking).
- â
Commercial use allowed
- â
Modification allowed
- â
Distribution allowed
- â ïļ Must include license notice
---
## ð Acknowledgments
- **NVIDIA** â Nemotron-Cascade-8B-Thinking base model
- **IBM Quantum** â Hardware access (ibm_fez, Heron r2)
- **Anthropic Claude** â Synthetic dataset generation
- **Qiskit Community** â Quantum computing framework
---
## ð Citation
```bibtex
@misc{kairos2025,
title={Kairos: Open Source AI Quantum/Classical Cryptography Assistant},
author={squ11z1},
year={2025},
publisher={HuggingFace},
url={https://huggingface.co/squ11z1/Kairos}
}
```
---
Kairos â Securing the Cryptographic Future
Open Source âĒ Enterprise-Ready âĒ Quantum-Safe