Sign In

Communications of the ACM

ACM TechNews

Novel ASIC Implements Post-Quantum Cryptography


View as: Print Mobile App Share: Send by email Share on reddit Share on StumbleUpon Share on Hacker News Share on Tweeter Share on Facebook
TUM team ASIC implements post-quantum cryptography

Established processes that can fight off attacks launched with today's computer technologies will be defenseless against quantum computers.

An application-specific integrated circuit (ASIC) that efficiently deploys post-quantum cryptography could protect against future hacker attacks using quantum computers. The device has been designed and commissioned for production by a team of researchers at Germany's Technical University of Munich (TUM).

Researchers engineered the chip using a hardware/software co-design approach that pairs complementary components and control software. TUM's Georg Sigl said this approach made the chip about 10 times faster than wholly software-based chips when using the lattice-based Kyber post-quantum cryptography algorithm, while reducing energy consumption by approximately eightfold. He also said four unique hardware trojans have been installed in the ASIC, with the goal of evaluating post-quantum cryptography evasion techniques.

"Combined with effective post-quantum cryptography, this could help us make hardware more secure—in industrial facilities as well as in cars," Sigl commented.

From Electronics Weekly
View Full Article

 

Abstracts Copyright © 2021 SmithBucklin, Washington, DC, USA


 

No entries found

Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
ACM Resources