Press ReleaseArtificial IntelligenceCyber SafetyGovernance & ComplianceThreat Detection & Defense

IDEMIA Secure Transactions (IST) Announces its First Hardware Accelerator Designed for Post-Quantum Cryptography

IIDEMIA Secure Transactions introduces a new hardware accelerator for post-quantum cryptography, enhancing data protection against quantum computing threats while ensuring high performance and seamless user experiences.

IDEMIA Secure Transactions (IST) is announcing today an advanced post-quantum accelerator based on Keccak[1], a core function widely used in new cryptographic algorithms.

Post-quantum algorithms are highly demanding on computational resources to ensure robust security. By utilising hardware accelerators, intensive tasks can be offloaded from the main processor, significantly boosting both speed and efficiency. This approach is essential for ensuring secure, seamless and efficient data protection against the rising threats posted by quantum computing.

Leveraging IST’s integrated design expertise and its deep knowledge in post-quantum cryptography, this latest hardware accelerator permits a more rapid execution of the quantum-resistant algorithms standardised by the National Institute of Standards and Technology (NIST)[2]. This advanced module optimises cryptographic performance, enabling a smooth transition to post-quantum solutions without compromising speed or ease of use. It will be embedded in all future quantum-safe chips from IDEMIA Secure Transactions.

Innovation at the heart of digital resilience

This advancement comes at a critical juncture, as organisations across the banking, automotive, IoT, Industry 4.0 and healthcare sectors are seeking robust solutions to safeguard their long-term data security. It offers several benefits for service providers as well as end-users:

  • For businesses: by adapting the design to new cryptography standards, IST offers an agile solution, capable of effortlessly supporting service providers in their post-quantum migrations.
  • For end-users: this innovation ensures enhanced security against next-generation cyberattacks while maintaining the current user experience. Card payments, crypto wallets and communications via SIM cards or NFC products will remain seamless while benefiting from state-of-the-art security.

A holistic approach to security

As a global leader in secure solutions, IDEMIA Secure Transactions is committed to accompanying its customers in their post-quantum migration. This technological advancement exemplifies our holistic approach to securing the future, offering robust protection and seamless user experiences amid the quantum challenges,” said Marc BERTIN, Chief Technology Officer at IDEMIA Secure Transactions.

[1] Keccak is a cryptographic hash function, which was selected as the winner of the NIST (National Institute of Standards and Technology) SHA-3 (Secure Hash Algorithm) competition.

[2] ML-KEM (FIPS 203), ML-DSA (FIPS 204) and SLH-DSA (FIPS 205)

CSA Editorial

Launched in Jan 2018, in partnership with Cyber Security Malaysia (an agency under MOSTI). CSA is a news and content platform focusing on key issues in cybersecurity in the region. CSA is targeted to serve the needs of cybersecurity professionals, IT professionals, Risk professionals and C-Levels who have an obligation to understand the impact of cyber threats.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *