Encryption Tech Developed to Protect Microdevices from Hacker attacks conducted by Quantum Computers

Spread the love
 © Roberto Schirdewahn In order to test cryptographic techniques for microdevices, the researchers develop the central components of the devices and implement them on evaluation platforms.

© Roberto Schirdewahn In order to test cryptographic techniques for microdevices, the researchers develop the central components of the devices and implement them on evaluation platforms.

The Hardware Security Group at the Ruhr-Universität Bochum is currently working towards protecting the data against threats of tomorrow with the devices available today. Due to a novel computation paradigm, quantum computers could break certain cryptographic techniques that are widely used today. We must now brace ourselves for the fact that highly powerful quantum computers may exist in a few years’ time, says Prof Dr.-Ing. Tim Güneysu.

Cryptography is implemented in many devices with a long service life, eg in satellites. Those devices have to remain secure in many years’ to come. Likewise, microdevices handling long-term critical data, such as electronic health cards, require cryptographic systems that are secure in the long term.

Under the project “Post-Quantum Cryptography,” Tim Güneysu and his colleagues identified categories of cryptographic techniques which can ensure security even in the era of quantum computers. Moreover, the IT security experts demonstrated that those techniques can also be implemented in microdevices. The challenge associated with techniques of so-called post-quantum cryptography is the fact that they require extremely long cryptographic keys. The low-performance processors of current microdevices cannot yet handle those long keys efficiently.

In order to tackle this problem, they used primarily alternative representations of cryptographic techniques, which, for example, introduce additional structures aiming at reducing the key size. Moreover, they also optimized the algorithms for the respective target platform. Depending on the technique they used, the researchers were able to merge complex steps with other computations or even to omit them completely, without reducing the security margin of the cryptographic scheme.

Details are in the article in the science magazine Rubin: http://rubin.rub.de/en/cryptography-microdevices
http://aktuell.ruhr-uni-bochum.de/pm2015/pm00183.html.en