MENU

Three-in-one post quantum cryptography PQC block saves area, power

Three-in-one post quantum cryptography PQC block saves area, power

News |
By Nick Flaherty

Cette publication existe aussi en Français


UK chip designer EnSilica has developed a combined PQC hardware encryption accelerator IP block that cuts the silicon area by two thirds.

The licensable eSi-CRYSTALS PQC accelerator supports the full CRYSTALS post-quantum cryptography (PQC) suite approved by the US National Institute of Standards and Technology (NIST), Integrating three IP blocks for the Dilithium (FIPS-204), Kyber (FIPS-203) and SHA-3 (FIPS-202) algorithms saves silicon area, power and cost.

After several years of competition, NIST released its first three finalised PQC standards to address the threat of quantum computers cracking the existing AES encryption standards in the future. However the first implementations have been for enterprise and networking systems where the silicon area is less important.

EnSilica previously announced separate Dilithium, Kyber and SHA-3 algorithms licensed for use by a major semiconductor company for a 5 nm networking ASIC. The new IP offers a more compact implementation than separate cores. EnSilica also has a full suite of classical cryptographic accelerators including ECC, ECDSA, RSA, AES, ChaCha20, and Poly1305. In addition, the company offers a NIST-compliant true random number generator (TRNG).

Combining the three PQC accelerators into a single block allows PQC algorithms to be used in a wider range of chips, including edge processing.

Harvest now, decrypt later

“The emerging PQC threat is not just theoretical. Security analysts warn that adversaries can already capture encrypted data today, with the intention of decrypting it in the future when quantum capabilities become available, a tactic known as ‘harvest now, decrypt later’,” said Ian Lankshear, CEO of EnSilica. “The implications are profound for those relying on today’s cryptographic schemes, which is why EnSilica’s PQC offering delivers future-proof hardware protection at the silicon level with minimal silicon area for mature and advanced technology nodes.”

Dilithium is used for digital signatures, providing authentication and data integrity, while Kyber is a key encapsulation mechanism that enables secure key exchange. Integrated into the block is also a hardware-optimised implementation of the cryptographic SHA-3 hash function that creates a digital fingerprint of data allowing for robust integrity verification. Together, these algorithms form the foundation for quantum-resistant security in modern systems, ensuring long-term protection of sensitive information.

www.ensilica.com

 

If you enjoyed this article, you will like the following ones: don't miss them by subscribing to :    eeNews on Google News

Share:

Linked Articles
10s