This quantum chip has been infected with dangerous malware - but for a good cause

Researchers have designed a chip that incorporates four hardware trojans , which they hope to use to help them study and work out efficient...

Researchers have designed a chip that incorporates four hardware trojans, which they hope to use to help them study and work out efficient strategies to nullify against such hardware-based attacks.

Designed by researchers at the Technical University of Munich (TUM), the chips are meant to efficiently implement post-quantum cryptography, in light of the fact that Quantum computers are expected to render the current encryption algorithms completely useless. 

The chip, which has already been approved for production, is a milestone since it successfully manages to address the issue of the enormous processing power that the post-quantum encryption methods require.

“Ours is the first chip for post-quantum cryptography to be based entirely on a hardware/software co-design approach. As a result, it is around 10 times as fast when encrypting with Kyber, one of the most promising candidates for post-quantum cryptography, as compared to chips based entirely on software solutions. It also uses around eight times less energy and is almost as flexible,” says Georg Sigl, Professor of Security in Information Technology, who heads the team of researchers at TUM.

Hardware trojans inside

The chip is an application-specific integrated circuit (ASIC) and is a modification of an open source chip design based on the open source RISC-V standard. The design also incorporates a purpose-designed hardware accelerator.

Reasoning that hardware-based trojans could nullify the advantages of a post-quantum cryptography, the researchers also incorporated some into their chip to watch and study them in action.

“To develop protective measures, we need to think like an attacker and try to develop and conceal our own trojans. In our post-quantum chip we have therefore developed and installed four hardware trojans, each of which works in an entirely different way,” explains Sigl.

The researchers will study the chips over the next few months, before taking them apart in a complex process for research purposes. The intent here is to develop standardized processes to check that chips rolling out from the assembly line are up to spec and that their design hasn’t been tampered with by high-tech rouge agents. 



from TechRadar - All the latest technology news https://ift.tt/3rWMdwE
via IFTTT

COMMENTS

BLOGGER
Name

Apps,3858,Business,151,Camera,1155,Earn $$$,3,Gadgets,1741,Games,926,GTA,1,Innovations,3,Mobile,1697,Paid Promotions,5,Promotions,5,Sports,1,Technology,8106,Trailers,796,Travel,37,Trending,4,Trendly News,25335,TrendlyNews,183,Video,5,XIAOMI,13,YouTube - 9to5Google,182,
ltr
item
Trendly News | #ListenNow #Everyday #100ShortNews #TopTrendings #PopularNews #Reviews #TrendlyNews: This quantum chip has been infected with dangerous malware - but for a good cause
This quantum chip has been infected with dangerous malware - but for a good cause
Trendly News | #ListenNow #Everyday #100ShortNews #TopTrendings #PopularNews #Reviews #TrendlyNews
http://www.trendlynews.in/2021/08/this-quantum-chip-has-been-infected.html
http://www.trendlynews.in/
http://www.trendlynews.in/
http://www.trendlynews.in/2021/08/this-quantum-chip-has-been-infected.html
true
3372890392287038985
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share. STEP 2: Click the link you shared to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy