• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.
  • The forums have been upgraded with support for dark mode. By default it will follow the setting on your system/browser. You may override it by scrolling to the end of the page and clicking the gears icon.

Microchip Brings Hardware Quantum Resistance to Embedded Controllers

Nomad76

News Editor
Staff member
Joined
May 21, 2024
Messages
1,298 (3.58/day)
Driven by advancements in cryptographic research and the need for stronger security measures, the National Security Agency (NSA) introduced the Commercial National Security Algorithm Suite 2.0 (CNSA 2.0) to establish a set of quantum-resistant cryptographic standards. The NSA is now urging data center and computing markets to become post-quantum ready within the next two years. To help system architects meet evolving security demands, Microchip Technology has developed its MEC175xB embedded controllers with embedded immutable post-quantum cryptography support.

As a standalone controller, the MEC175xB family employs a modular approach for developers to efficiently adopt post-quantum cryptography, helping ensure long-term data protection without compromising existing functionality. These low-power controllers are designed with National Institute of Standards and Technology (NIST) approved post-quantum cryptographic algorithms, configurable secure boot solutions and an advanced Enhanced Serial Peripheral Interface (eSPI).



"As the significance of potential, future attacks on cryptography using quantum computing is understood more widely, the cybersecurity landscape is already undergoing substantial transformations," said Nuri Dagdeviren, corporate vice president of Microchip's security products business unit. "Our MEC175xB controllers, featuring quantum-resistant cryptography implemented in immutable hardware with efficient power management, are designed to equip our customers with the tools they need to navigate increasingly complex digital security requirements."

MEC175xB controllers incorporate CNSA 2.0-compliant Module-Lattice-Based Digital Signature Algorithms (ML-DSA), Merkle stateful hash-based Leighton-Micali Signature (LMS) verification and Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM) standardized by NIST. These new algorithms with quantum attack resistance are implemented in immutable hardware to block attack paths possible on software implementations.

The controllers feature secure boot and secure firmware update schemes configurable to use either CNSA 1.0 or 2.0 or hybrid-based signature verification. Attestation capabilities use ML-DSA for signing and key generation to enhance system integrity and authenticity. At the core is an Arm Cortex -M4F processor with a Memory Protection Unit (MPU) running at 96 MHz to deliver high performance for complex computations and real-time applications. The controllers include 480 KB of SRAM, I3C host and client interfaces and an optional USB 2.0 Full-Speed interface for versatile connectivity.

Visit the website to learn more about Microchip's portfolio of security products.



Development Tools
MEC175xB controllers are compatible with MPLAB X Integrated Development Environment (IDE), and supported by example projects, such as blinking LEDs, available in the Secure Document Extranet (SDE) and external tools such as Zephyr. The controllers are also supported by the MEC1753-240 MECC (EV48H83A) development board.

Pricing and Availability
MEC175xB controllers are currently available as part of Microchip's early adopter program.

View at TechPowerUp Main Site | Source
 
Apparently, they missed that memo that said:

"Resistance is futile", hehehehe :D
 
For every action there is an equal and opposite reaction.
It will still be cracked.
 
The problem with post-quantum crypto is that the threat is so far in the future. We're unable to run Shor's Algorithm on any existing quantum computer or "computer" for non-trivial numbers yet. That's the basis of breaking currently used crypto.

The push to replace tried and tested algorithms with PQC, especially coming from NIST and NSA sounds like we're about to relive the elliptic curve cryptography backdoor scandal.
 
Back
Top