This quantum chip has been infected with dangerous malware – but for a good cause TUM's post-quantum cryptography chip


Researchers have designed a chip that incorporates four hardware trojans, which they hope to use to help them study and work out efficient strategies to nullify against such hardware-based attacks.
Designed by researchers at the Technical University of Munich (TUM), the chips are meant to efficiently implement post-quantum cryptography, in light of the fact that Quantum computers are expected to render the current encryption algorithms completely useless.
The chip, which has already been approved for production, is a milestone since it successfully manages to address the issue of the enormous processing power that the post-quantum encryption methods require.
“Ours is the first chip for post-quantum cryptography to be based entirely on a hardware/software co-design approach. As a result, it is around 10 times as fast when encrypting with Kyber, one of the most promising candidates for post-quantum cryptography, as compared to chips based entirely on software solutions. It also uses around eight times less energy and is almost as flexible,” says Georg Sigl, Professor of Security in Information Technology, who heads the team of researchers at TUM.
Hardware trojans inside
The chip is an application-specific integrated circuit (ASIC) and is a modification of an open source chip design based on the open source RISC-V standard. The design also incorporates a purpose-designed hardware accelerator.
Reasoning that hardware-based trojans could nullify the advantages of a post-quantum cryptography, the researchers also incorporated some into their chip to watch and study them in action.
“To develop protective measures, we need to think like an attacker and try to develop and conceal our own trojans. In our post-quantum chip we have therefore developed and installed four hardware trojans, each of which works in an entirely different way,” explains Sigl.
The researchers will study the chips over the next few months, before taking them apart in a complex process for research purposes. The intent here is to develop standardized processes to check that chips rolling out from the assembly line are up to spec and that their design hasn’t been tampered with by high-tech rouge agents.
Researchers have designed a chip that incorporates four hardware trojans, which they hope to use to help them study and work out efficient strategies to nullify against such hardware-based attacks. Designed by researchers at the Technical University of Munich (TUM), the chips are meant to efficiently implement post-quantum cryptography, in…
Recent Posts
- The hidden costs of data subject access requests (DSARs) on privacy
- Everything new on Disney+ in March 2025: Marvel’s Daredevil: Born Again, Moana 2, Sadie Sink’s O’Dessa movie, and more
- The best Apple Watch in 2025
- Volvo ES90 will charge faster, drive farther than other Volvo EVs
- The truth about GenAI security: your business can’t afford to “wait and see”
Archives
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010