This quantum chip has been infected with dangerous malware - but for a good cause

TUM's post-quantum cryptography chip
(Image credit: Technical University of Munich (TUM))

Researchers have designed a chip that incorporates four hardware trojans, which they hope to use to help them study and work out efficient strategies to nullify against such hardware-based attacks.

Designed by researchers at the Technical University of Munich (TUM), the chips are meant to efficiently implement post-quantum cryptography, in light of the fact that Quantum computers are expected to render the current encryption algorithms completely useless. 

The chip, which has already been approved for production, is a milestone since it successfully manages to address the issue of the enormous processing power that the post-quantum encryption methods require.

“Ours is the first chip for post-quantum cryptography to be based entirely on a hardware/software co-design approach. As a result, it is around 10 times as fast when encrypting with Kyber, one of the most promising candidates for post-quantum cryptography, as compared to chips based entirely on software solutions. It also uses around eight times less energy and is almost as flexible,” says Georg Sigl, Professor of Security in Information Technology, who heads the team of researchers at TUM.

Hardware trojans inside

The chip is an application-specific integrated circuit (ASIC) and is a modification of an open source chip design based on the open source RISC-V standard. The design also incorporates a purpose-designed hardware accelerator.

Reasoning that hardware-based trojans could nullify the advantages of a post-quantum cryptography, the researchers also incorporated some into their chip to watch and study them in action.

“To develop protective measures, we need to think like an attacker and try to develop and conceal our own trojans. In our post-quantum chip we have therefore developed and installed four hardware trojans, each of which works in an entirely different way,” explains Sigl.

The researchers will study the chips over the next few months, before taking them apart in a complex process for research purposes. The intent here is to develop standardized processes to check that chips rolling out from the assembly line are up to spec and that their design hasn’t been tampered with by high-tech rouge agents. 

Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.

Read more
HP LaserJet 8501x
HP launches world's first printers that can resist quantum computer attacks
Optical system for data encryption
Is it quantum-resistant? Researchers create 'uncrackable' encryption system by pairing AI and holograms produced by laser
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
The logo of Google Cloud
Google Cloud introduces quantum-safe digital signatures
Microsoft Majorana-1 quantum chip
Microsoft set to rival Google, IBM with first-of-its-kind quantum chip with topological core architecture
Equal1 Bell-1 quantum computer
This is the first quantum computer you can actually buy (and use, and power): Equal1's Bell-1 uses a standard power socket
Latest in Security
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Coinbase targeted after recent Github attacks
IBM office logo
IBM to provide platform for flagship cyber skills programme for girls
Oracle
Oracle denies data breach after hacker claims to hold six million records
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Latest in News
Tesla Roadster 2
Tesla is still taking deposits on its long overdue Roadster, despite promising it would arrive in 2020
Samsung HW-Q990D soundbar with Halloween theme over the top
Samsung promises to repair soundbars bricked by its disastrous software update for free – but it'll probably involve shipping
Google Gemini AI
Gmail is adding a new Gemini AI tool to help smarten up your work emails
DJI Mavic 3 Pro
More DJI Mavic 4 Pro leaks seemingly reveal launch date, price and key features of the triple camera drone – here's what to expect
Android 16 logo on a phone
Here's how Android 16 will upgrade the screen unlocking process on your Pixel
Man sitting on sofa, drinking coffee, looking at phone in surprise
Thousands of coffee lovers warned to stop using their espresso machines immediately after reports of burns and lacerations