Firmware integrity in the quantum age

As we entrust more aspects of our lives to the digital world, security is a fundamental need of society with increasing importance. The connected world in which we live is constantly expanding to encompass more ‘things’, further driving the
demand for security. The ability to update these things over-the-air (OTA) is a huge benefit – and a risk as malicious code can be injected allowing third parties to take control.

Cryptographic techniques including public and private keys used in conjunction with hardware devices such as TPMs have provided strong security, allowing users to be confident that attacks are unlikely to be successful.

However, things are changing with the research on quantum computers – machines that use quantum mechanical phenomena to solve mathematical challenges that are not possible with conventional computers. With this level of computing power, quantum computers would be able to break public key cryptography, seriously compromising the confidentiality and integrity of all forms of digital communications.

In this technical whitepaper, Infineon will look at the threat posed by quantum computing and discuss how cryptography will evolve to provide security and trust in a post-quantum world, including: 

  • The threat from quantum computers
  • Why do we need to act now?
  • Developing post-quantum computing standards
  • Stateful Hash-Based Signatures
  • What is the role of TPM?
  • The evolutionary path
  • A TPM for the PQC world
  • Infineon support for TPM development

Download this whitepaper now from Infineon by completing the registration boxes.

 

Register Now

We want to make sure you know exactly what information about you we keep and how we use it. Please read these terms and conditions carefully and make sure that you understand them before agreeing to them.

ElectronicSpecifier, EBV and Infineon will use your data to communicate with you in the ways you have agreed to, and in accordance with our Privacy Policy. You can opt out of all communications or the ways in which we process your data at any time by contacting us. For full details, see our Privacy Policy