Home > All news > Industry News > STmicroelectronics Reveals Solutions for Post Quantum Cryptography
芯达茂F广告位 芯达茂F广告位

STmicroelectronics Reveals Solutions for Post Quantum Cryptography

With the rapid development of quantum computing technology, quantum computers have become increasingly outstanding in research experiments, gradually surpassing traditional computers. This trend has aroused great concern in various industries, and they have taken precautions to actively prepare for the arrival of the era of quantum computing. Against this backdrop, STMicroelectronics has launched a series of innovative solutions for post-quantum cryptography that will provide a solid line of defense against quantum attacks for future embedded systems.

Post-quantum cryptography, as an emerging and crucial research field, was born from the huge impact of quantum computing on the existing cryptosystem. Traditional encryption algorithms, such as the widely used RSA algorithm, rely on mathematical problems, such as large integer factorization and discrete logarithm problems. In the age of classical computers, it took an extremely long time to solve these puzzles to ensure the security of encrypted information. However, with its unique qubits and quantum algorithms, quantum computers can theoretically solve these traditional problems in a very short time. For example, the advent of the Shor algorithm makes quantum computers a serious threat to existing public-key cryptography in the future. Once quantum computers mature and are maliciously used, the data protected by traditional encryption technologies in many fields such as the Internet, finance, and communications will face the risk of being stolen or tampered with. This not only poses a huge challenge to personal privacy and corporate trade secrets, but can also lead to serious social and economic problems. Therefore, it is urgent to develop post-quantum cryptography technologies that can resist quantum attacks.

As quantum computers continue to make breakthroughs in research and experimentation, gradually surpassing classical computers, various industries are paying more attention to the potential impact of quantum computing. At the same time, new government norms have sprung up to boost the standardization of post-quantum cryptography (PQC). These specifications provide reliable guarantees for data security with the help of new technologies based on mathematical problems that are difficult to solve with quantum computers. The PQC standard currently released uses the award-winning Keccak algorithm, a highly resistant hashing algorithm invented by ST experts.

Pictured: STMicroelectronics unveils post-quantum cryptography solutions (Source: STMicroelectronics).

To meet today's needs, ST offers hardware cryptographic accelerators and related software libraries for general-purpose and secure microcontrollers. These solutions help product developers build security based on current best practices and continuously improve the resilience of their systems as technology evolves. STMicroelectronics' new solution supports STM32 developers with the X-CUBE-PQC software library; Stellar automotive microcontrollers with SHA-3 hardware accelerators can also benefit. In addition, for secure microcontrollers, ST has introduced new software libraries and hardware IP that are Common Criteria compliant with the Common Criteria and FIPS 140-3 specifications, and support PQC algorithms such as ML-KEM, ML-DSA, and XMSS/LMS.

 Jacques Fournier, Director of Security Platforms, STMicroelectronics, said: "Quantum computers have the potential to bring significant advantages in many fields, including finance, scientific research, and Earth observation. However, it can also invalidate some of the existing encryption technology in devices that are used every day. STMicroelectronics is the first in its entire product line to offer all customers quantum-resistant features that meet the needs of different levels of security. ”

ST's post-quantum cryptography assets are ready for use, enabling customers to add quantum-resistant capabilities to key security features such as firmware updates, secure boot, and authentication.

Related news recommendations

Login

Registration

Login
{{codeText}}
Login
{{codeText}}
Submit
Close
Subscribe
ITEM
Comparison Clear all