Presented by
-
Principal Cryptography/Security Architect, NXP Semiconductors
-
Cryptographer, NXP Semiconductors
-
VP BlackBerry Certicom, BlackBerry
Sign in to access this content and additional site features.
Quantum computing has never been closer to becoming a reality and with it, Y2Q, when quantum computers become weaponized by threat actors. Y2Q threatens to render many widely used cryptography solutions useless.
This is an urgent problem for manufacturers of products that will last 5 or more years. Design decisions made now will likely live past Y2Q and therefore need to consider how security can be maintained post quantum.
Based on BlackBerry’s Certicom technology, the Quantum resistant code signing server combined with the NXP S32G2 chip’s secure boot flow, we present a fast and agile quantum protected demonstrator. Using quantum resistant signature schemes such as Dilithium for low level device firmware, over the air software updates and software bills of material (SBOMs) mitigates the risk of potential quantum computing attacks on critical software updates; something which addresses a major security concern for industries like healthcare, transportation, aerospace and defense that rely on assets that will be in use for a long time.
We are looking for ways to improve.
Subscribe to our newsletter to stay updated with our latest developments and if you need further assistance, we are here to help.
Subscribe Contact Support