As quantum computing progresses, it is anticipated to compromise current security systems that protect sensitive information. Scientists and officials are developing post-quantum cryptography to counter these forthcoming threats. Researchers at MIT have created a highly efficient microchip that can apply post-quantum cryptography to wireless biomedical devices, such as pacemakers and insulin pumps, which typically lack the power to support these intensive security protocols.
The new chip, about the size of a fine needle tip, also incorporates measures to prevent physical hacking that could bypass encryption and access user data, like a patient’s social security number. This innovation is over ten times more energy-efficient than previous designs. The chip could eventually allow next-generation wireless medical devices to maintain robust security as quantum computing becomes more widespread, and it could also be used in other power-limited devices like industrial sensors.
“Tiny edge devices are everywhere, and biomedical devices are often the most vulnerable attack targets because power constraints prevent them from having the most advanced levels of security. We’ve demonstrated a very practical hardware solution to secure the privacy of patients,” says Seoyoon Jang, an MIT electrical engineering and computer science graduate student and lead author of a paper on the chip.
Jang collaborated on the paper with others, including Saurav Maji PhD ’23, visiting scholar Rashmi Agrawal, and senior author Anantha Chandrakasan. The research was presented at the IEEE Custom Integrated Circuits Conference.
Many wireless biomedical devices currently lack robust security because existing security protocols are computationally demanding, Jang notes. However, post-quantum cryptography (PQC) is crucial, as organizations like NIST plan to replace traditional cryptography with stronger PQC algorithms. Some in the industry argue that rapid progress in quantum technology makes PQC implementation even more urgent.
The MIT team designed a custom microchip, known as an application-specific integrated circuit (ASIC), to bring energy-efficient PQC protocols to wireless biomedical devices. “PQC is very secure algorithmically, but making a device resilient against physical attacks usually requires additional countermeasures that pump up the energy consumption at least two or three times. We want our chip to be robust to both security threats in a very lightweight manner,” Jang says.
To achieve their objectives, the researchers used several design strategies. They implemented two different PQC schemes to ensure robustness and future-proof their device. They also optimized energy efficiency by allowing PQC algorithms to share computational resources. Additionally, an on-chip true random number generator was developed for generating secret keys, improving both security and energy efficiency.
They incorporated countermeasures against power side-channel attacks, which involve analyzing a device’s power consumption to steal information. By adding minimal redundancy to PQC operations, they protected the chip from such attacks. Furthermore, an early fault-detection mechanism was introduced to halt operations if a voltage glitch is detected, saving energy by avoiding completion of compromised procedures.
Overall, the device achieved 20 to 60 times higher energy efficiency than other PQC security methods and occupies less space than many existing chips. “As we transition into post-quantum approaches, providing strong security for even the most resource-limited devices is essential. This work shows that robust cryptographic protection for biomedical and edge devices can be achieved alongside energy efficiency and programmability,” says Chandrakasan.
Going forward, the researchers aim to apply these methods to other vulnerable systems and energy-limited devices. This research received funding from the U.S. Advanced Research Projects Agency for Health.
Original Source: news.mit.edu
