- Duration: 1 hr 8 mins
- Publication date: 11 Feb 2025
Abstract
Hosted with support from the Internet of Things Technical Network and the Quantum Engineering Technical Network
Quantum computing poses a serious threat to the security of current cryptographic algorithms, and the need for new algorithms that are resistant to quantum attacks is urgent. Several projects and initiatives are underway to develop and adopt post-quantum cryptography, such as hash-based signatures and lattice-based encryption schemes. However, implementing these algorithms in semiconductors and connected devices is challenging due to the constraints of memory, performance, and power consumption, as well as the risk of side-channel and fault attacks. The article provides some recommendations and best practices to secure post-quantum algorithm implementations, such as using constant-time, masking, and randomization techniques, designing adaptable and updateable architectures, and applying security certifications and testing.
Speakers:
Rob Taylor - Committee Member, IET Internet of Things Technical Network
Derwen Hinds FIET - Committee Member, IET Quantum Engineering Technical Network
Karine Villegas - Senior Principal Security and Cryptography Architect, Kudelski IoT