Intel partners with DARPA to build 'state-of-the-art' security chips

A three-year partnership will see the US chipmaker develop bespoke ASICs with built-in security features

The corner of a CPU chip seen on a circuitboard

Intel will develop customised chips embedded with novel hardware-based security protections as part of a three-year partnership with the R&D wing of the US Department of Defense (DoD).

Dubbed SAHARA, the chipmaker's agreement with the US Defense Advanced Research Projects Agency (DARPA) will see it develop a specialised version of its Application-Specific Integrated Circuits (ASICs).

The ultimate goal is to manufacture advanced 10nm chips with integrated, state-of-the-art cyber protections that can be fitted into DoD systems as well as other commercial devices.

DARPA aims to transform the ASIC chips currently in use in DoD systems, as well as develop new iterations that it can deploy in future with significantly higher performance and lower power consumption.

The agreement comes only a week after Intel struck a separate partnership with DARPA to develop a next-gen form of encryption, known as fully homomorphic encryption (FHE).

“SAHARA aims to dramatically shorten the ASIC design process through automation while adding unique security features to support manufacturing of the resulting silicon in zero-trust environments,” said program manager in DARPA’s Microsystems Technology Office, Serge Leef. “Additionally, Intel will establish domestic manufacturing capabilities for the structured ASICs on their 10nm process.”

ASICs are silicon chips designed for a specific purpose, created to perform a repeated function highly effectively. This is opposed to general-purpose CPUs which can perform a variety of functions but with much less efficiency. Once built, they cannot be reprogrammed or reconfigured to perform another function, unlike Field-Programmable Gate Arrays (FPGAs), which keeps manufacturing costs low for mass production.

Intel will develop unique cyber security safeguards for these custom ASICs to enhance the level of in-built data protection, and prevent intellectual property from being counterfeited or reverse-engineered.

Research teams based at the University of Florida, Texas A&M, and the University of Maryland will use verification, validation, and a variety of attack methods to test the specific security measures before they’re integrated into the ASIC design. Intel will then use its ASIC technology to develop platforms that speed up development time and reduce engineering costs when compared with traditional methods for building ASICs.

Featured Resources

B2B under quarantine

Key B2C e-commerce features B2B need to adopt to survive

Download now

The top three IT pains of the new reality and how to solve them

Driving more resiliency with unified operations and service management

Download now

The five essentials from your endpoint security partner

Empower your MSP business to operate efficiently

Download now

How fashion retailers are redesigning their digital future

Fashion retail guide

Download now

Recommended

Most employees put their workplace at risk by taking cyber security shortcuts
cyber security

Most employees put their workplace at risk by taking cyber security shortcuts

27 Jul 2021
61% of organizations say improving security a top priority for 2021
cyber security

61% of organizations say improving security a top priority for 2021

29 Jun 2021
ProtectedBy.AI’s CodeLock blocks malware at source code level
software as a service (SaaS)

ProtectedBy.AI’s CodeLock blocks malware at source code level

9 Jun 2021
CISOs aren’t leading by example when it comes to cyber security
cyber security

CISOs aren’t leading by example when it comes to cyber security

24 May 2021

Most Popular

The benefits of workload optimisation
Sponsored

The benefits of workload optimisation

16 Jul 2021
Samsung Galaxy S21 5G review: A rose-tinted experience
Mobile Phones

Samsung Galaxy S21 5G review: A rose-tinted experience

14 Jul 2021
Six ways boards can step up support for cyber security
Business strategy

Six ways boards can step up support for cyber security

22 Jul 2021