TUM team ASIC implements post-quantum cryptography

TUM team ASIC implements post-quantum cryptography

Such chips could provide protection against future hacker attacks using quantum computers. The researchers also incorporated hardware trojans in the chip in order to study methods for detecting this type of “malware from the chip factory”.


Hacker attacks on industrial operations are no longer science fiction – far from it. Attackers can steal information on production processes or shut down entire factories. To prevent this, communication between the chips in the individual components is encrypted. Before long, however, many encryption algorithms will become ineffective.

The established processes that can fight off attacks launched with today’s computer technologies will be defenseless against quantum computers. This is especially critical for equipment with a long lifespan such as industrial facilities.



Support the originator by clicking the read the rest link below.