
Q-SLICE Threat Harness v3 is a configurable testbed for simulating quantum adversarial scenarios. It builds on previous versions by introducing user‑input parameters so researchers can explore different environments and attack conditions without modifying the code. The harness integrates tests across eight threat vectors in the six Q-SLICE elements:
1. Quantum Exploitation (Grover, Shor)
2. Subversion of Trust (BB84, RNG bias)
3. Legacy Exploitation
4. Integrity Disruption (Bell states)
5. Coherence Attacks
6. Ecosystem Abuse
It also computes reproducible Q-SLICE metrics (depth, fidelity, leakage, bias, QBER). It enables organisations, researchers, and security leaders to:
How It Works
Q‑SLICE integrates advanced quantum simulation, adversarial modeling, and operational taxonomy design into a unified harness:
Quantum computing is rapidly reshaping the cybersecurity landscape. Traditional cryptographic systems face collapse under quantum algorithms, while new adversarial behaviors emerge. Q‑SLICE equips organizations with the tools to:
You can download the Q-SLICE threat model v3 for free from GitHub there is a (v1, v2 and v3) CLI, GUI and Dashboard version based on v3. complete with a user guide to help with interpreting results and building use cases. There is also v4 which is designed to run on IBM Quantum Cloud and does offer slightly different results being on real hardware and not a simulator as can be seen in the table below.
Link to: GitHub Q-SLICE Threat Harness
Link to: ORCID

Qubits is the target IBM aims to achieve by 2025, potentially placing RSA and ECC encryption at real risk
Of global encrypted internet traffic is vulnerable to quantum attacks if post-quantum cryptography is not adopted in time.
Dollars was allocated by the U.S. Department of Homeland Security in 2023 to accelerate post-quantum cryptography adoption.
Years is the estimated timeframe in which large-scale quantum computers could break RSA-2048 encryption, according to IBM projections.
Jeremy Green developer of Q-SLICE and QUANTA as part of his PhD in computer science. Is also a skilled and experienced security professional with more than 20 certifications across platform, security and DevSecOps including CISSP, CISM, CEH, ECDE and CHFI. He is also an official instructor for ISACA and EC Council and the author of Information Security Management Principles, fourth edition and Security Architecture A practical guide to designing proactive and resilient cyber protection published by BCS.

Author
Jeremy is also the author of BCS Information Security Management Principles Fourth Edition and Security Architecture: A practical guide to designing proactive and resilient cyber protection.

Instructor
Jeremy is an instructor for CompTIA, ISC2, ISACA and EC Council with twenty certifications. He also teachers Ethical Hacking and Digital Forensics on a Foundation Degree and holds a Cert Ed and QTLS.

Security Architect
Jeremy is a security architect supporting the security design and implementation of a large project for Leidos. Undertaking threat modelling, design assessment and stakeholder engagement.
Many organisations will be slow to recognise or respond to the threat posed by quantum computing, particularly in relation to its potential to break classical cryptographic systems. Some of this is due to quantum computing still being widely perceived as an abstract, long-term concern rather than an immediate operational risk.