
A team at the Chair of Security in Information Technology has developed a chip with particularly secure encryption technology. Johanna Baehr heads a second team at the chair that has hidden four hardware Trojans on this chip – malicious functions that are integrated directly into the circuits.
Chip with secure encryption will help in fight against hackers
A team at the Technical University of Munich (TUM) has designed and commissioned the production of a computer chip that implements post-quantum cryptography very efficiently. Such chips could provide protection against future hacker attacks using quantum computers. The researchers also incorporated hardware trojans in the chip in order to study methods for detecting this type of “malware from the chip factory”.
Hacker attacks on industrial operations are no longer science fiction – far from it. Attackers can steal information on production processes or shut down entire factories. To prevent this, communication between the chips in the individual components is encrypted. Before long, however, many encryption algorithms will become ineffective. The established processes that can fight off attacks launched with today’s computer technologies will be defenseless against quantum computers. This is especially critical for equipment with a long lifespan such as industrial facilities.
For this reason, security experts around the world are working to develop technical standards for “post-quantum cryptography”. One of the challenges is posed by the enormous processing power needed for these encryption methods. A team working with Georg Sigl, Professor of Security in Information Technology at TUM, has now designed and commissioned a highly efficient chip for post-quantum cryptography.
Speed and flexibility through a combination of hardware and software
Professor Sigl and his team took an approach based on hardware/software co-design, in which specialized components and the control software complement one another. “Ours is the first chip for post-quantum cryptography to be based entirely on a hardware/software co-design approach,” says Prof. Sigl.
“As a result, it is around 10 times as fast when encrypting with Kyber – one of the most promising candidates for post-quantum cryptography – as compared to chips based entirely on software solutions. It also uses around eight times less energy and is almost as flexible.”
Based on an open source standard
The chip is an application-specific integrated circuit (ASIC). This kind of specialized microcontroller is often manufactured in large numbers according to specifications of companies. The TUM team modified an open source chip design based on the open source RISC-V standard. It is used by increasing numbers of chip makers and could replace proprietary approaches of big companies in many areas. The chip’s post-quantum cryptography capabilities are facilitated by a modification of the processor core and special instructions that speed up the necessary arithmetic operations.
The design also incorporates a purpose-designed hardware accelerator. It not only supports lattice-based post-quantum cryptography algorithms such as Kyber, but could also work with the SIKE algorithm, which requires much more computing power. According to the team, the chip developed at TUM could implement SIKE 21 times faster than chips using only software-based encryption. SIKE is seen as the most promising alternative if the time comes when lattice-based approaches are no longer secure. Precautions of this kind make sense in applications where chips will be used for extended periods.
Hardware trojans evade post-quantum cryptography
Another potential threat, alongside the rise in conventional attacks, is posed by hardware trojans. Computer chips are generally produced according to companies’ specifications and made in specialized factories. If attackers succeed in planting trojan circuitry in the chip design before or during the manufacturing stage, this could have disastrous consequences. As in the case of external hacker attacks, entire factories could be shut down or production secrets stolen. What’s more: Trojans built into the hardware can evade post-quantum cryptography.
“We still know very little about how hardware trojans are used by real attackers,” explains Georg Sigl. “To develop protective measures, we need to think like an attacker and try to develop and conceal our own trojans. In our post-quantum chip we have therefore developed and installed four hardware trojans, each of which works in an entirely different way.”
Chip to be tested and then dismantled
Over the coming months, Prof. Sigl and his team will intensively test the chip’s cryptography capabilities and functionality and the detectability of the hardware trojans. The chip will then be destroyed – for research purposes. In a complex process, the circuit pathways will be shaved off incrementally while photographing each successive layer. The goal is to try out new machine learning methods developed at Prof. Sigl’s chair for reconstructing the precise functions of chips even when no documentation is available. “These reconstructions can help to detect chip components that perform functions unrelated to the chip’s actual tasks and which may have been smuggled into the design,” says Georg Sigl. “Processes like ours could become the standard for taking random samples in large orders of chips. Combined with effective post-quantum cryptography, this could help us to make hardware more secure – in industrial facilities as well as in cars.”
Original Article: A post-quantum chip with hardware trojans
More from: Technical University of Munich
The Latest Updates from Bing News & Google News
Go deeper with Bing News on:
Post-quantum cryptography
- Crypto Quantique partners with Blaitek enabling quantum secure chip-to-cloud connection
Crypto Quantique, a quantum-safe cybersecurity solutions provider, has signed a strategic partnership with Blaitek, an AIOT smart-home technology company, as part of its strategic expansion in the ...
- BTQ and Hon Hai Research Institute Team Up To Help Pioneer Post-Quantum Cryptography Standards
BTQ Technologies Corp. announces that its wholly owned subsidiary, BTQ AG, has entered into a Research and Collaboration Agreement with Hon Hai ...
- Safeguarding Against Quantum Attacks Is a National Imperative
The arrival of quantum computing presents a challenge of such enormity that it surpasses the capacities of individual enterprises ...
- Cybersecurity in the quantum era: Preparing for Q Day
The concept of 'Q Day' refers to a hypothetical scenario where quantum computers become advanced enough to break most of the encryption that currently secures digital communications and data ...
- Quantum Computing and the Future of Encryption: A Game-Changer or Hype?
In the ever-evolving landscape of technology, quantum computing has emerged as a promising frontier with the potential to revolutionize various industries. One area where its impact is keenly ...
Go deeper with Google Headlines on:
Post-quantum cryptography
[google_news title=”” keyword=”post-quantum cryptography” num_posts=”5″ blurb_length=”0″ show_thumb=”left”]
Go deeper with Bing News on:
Hardware/software co-design
- What are the best hardware design tools for machine learning applications?
To overcome these challenges, you need FPGA design tools that can help you with high-level synthesis, hardware-software co-design, simulation, verification, and debugging. Some of the best FPGA ...
- OpenAI appoints former Google TPU lead as head of hardware, hiring for "experts in data center facility design"
Richard Ho leads new division at the generative AI startup to help "influence roadmaps for hardware partners for data center networks, racks, and buildings" ...
- Virtual Prototyping Platform with Flash Memory
Hardware-software co-design is an integral part of SoC development flow. Besides traditional prototyping methodologies like FPGA prototyping, virtual prototyping has emerged as a convenient and ...
- Hardware / Software Partitioning Methodology for Systems on Chip (SoCs) with RISC Host and Configurable Microprocessors
Studies of hardware/software co-design have been made for a long time. The first methodology is the one of Intellectual Properties (IP) re-use. As it¡¯s related technology, studies of interface ...
- hardware software co design Jobs in Hyderabad
There are no more search result available on current page for you. Refresh the page or go next page to see the results again ...
Go deeper with Google Headlines on:
Hardware/software co-design
[google_news title=”” keyword=”hardware/software co-design” num_posts=”5″ blurb_length=”0″ show_thumb=”left”]