Post-Quantum Cryptography on Contactless Chip

Tuesday, May 30, 2017 @ 04:05 PM gHale

Quantum computers have the disruptive potential to break various currently used encryption algorithms.

Infineon Technologies showed the first post-quantum cryptography implementation on a commercially available contactless security chip, as used for electronic ID documents.

Intentional Flaws Prevent 3-D Printing Hacks
Solar can Combat Grid Security Risks
Big Data Meets Nuclear Power
Making Power Grid Smarter

“Demonstrating post-quantum cryptography on a contactless security chip puts Infineon in a leading position in this field,” said Stefan Hofschen, president of the Chip Card & Security Division of Infineon. “Our security solutions rely on trusted and standardized private and public key algorithms. To better respond to security threats that are yet to come, we continuously collaborate with the academic community, customers and partners. And we push for future standards that can be executed efficiently and securely on small and embedded devices.”

Quantum computer attacks on today’s cryptography are expected to become reality within the next 15 to 20 years. Once available, quantum computers could solve certain calculations much faster than today’s computers, threatening even best security algorithms such as RSA and ECC.

Internet standards like Transport Layer Security (TLS), S/MIME or PGP/ GPG use cryptography based on RSA or ECC to protect data communication with smart cards, computers, servers or industrial control systems. Online banking on “https” sites or “instant messaging” encryption on mobile phones are perfect examples.

Infineon security experts and the Center of Excellence for contactless technologies in Graz, Austria, made a breakthrough in this field.

They implemented a post-quantum key exchange scheme on a commercially available contactless smart card chip. Key exchange schemes end up used to establish an encrypted channel between two parties.

The deployed algorithm is a variant of “New Hope,” a quantum-resistant cryptosystem also explored successfully by Google on a development version of the Chrome browser.

“The phantom of the quantum computer is keeping academia and the IT industry on high alert,” said Thomas Pöppelmann from Infineon’s Chip Card & Security Division, who has been co-developing the New Hope algorithm. “Our challenges comprised the small chip size and limited memory capacity to store and execute such a complex algorithm as well as the transaction speed.”

Thomas Pöppelmann and his co-researchers received the Facebook Internet Defense Prize 2016 for the development of New Hope.

In a world of quantum computers, post-quantum cryptography should provide a level of security comparable with what RSA and ECC provide today in the classical computing world. However, to withstand quantum calculation power, key lengths need to be longer than the usual 2048 bits of RSA or the 256 bits of ECC. Nevertheless, researchers implemented New Hope on a commercially available security chip without requiring additional memory space and hence a larger chip size.

Standardization bodies are expected to agree on one or multiple post-quantum cryptography algorithms within the next few years before governments and industries mandate the migration.

Leave a Reply

You must be logged in to post a comment.