With the quantum threat on the horizon, and the prevalence of so-called harvest-now-decrypt-later attacks, information security is more important than ever. That’s why, in the last few years, there’s been a renewed focus on protecting hardware from attack, especially as new chips are designed, built and deployed into the technology supply chain.
Recently, Keysight Technologies, with their acquisition of Riscure, debuted Keysight Inspector, a new tool that’s designed to identify hardware vulnerabilities in the design cycle. Keysight Inspector is specifically useful for testing implementations of the ML-DSA algorithm (formerly known as Dilithium) before implementation by simulating the hardware code both pre- and post-silicon.
This is particularly exciting for PQShield, as the tool can be used to verify our PQC implementations at an early stage. In fact, the tool itself builds on some of our collaboration with Riscure, especially when it comes to our advanced work in side-channel and fault-injection defense.
Post-quantum encryption is, of course, the key to quantum resilience, but even PQC can be vulnerable to hardware-based threats. As the world begins to implement post-quantum cryptography into the supply chain, the need for testing at scale is apparent, and it’s great to see tools that can proactively help verify that we’re keeping the quantum threat at bay.
Read the original article here.