Workshop Description
Supply chain compromise in defence is not theoretical. Documented incidents include counterfeit electronic components in military aircraft, firmware manipulation in network equipment, and interdiction of hardware during transit. Classical verification relies on visual inspection, electrical testing, and digital signatures using RSA or ECDSA. Quantum computing threatens the signature-based verification layer, while quantum sensing and PUF technology offer new authentication capabilities that are physically impossible to clone.
This workshop covers the full spectrum of quantum-relevant supply chain security. Participants examine PUF technology (SRAM PUFs, arbiter PUFs, optical PUFs) and how their inherent manufacturing variation creates unique, unclonable device fingerprints. The session covers quantum token concepts for provenance tracking, PQC signature schemes (ML-DSA, SLH-DSA) for firmware and software integrity, and practical implementation of cryptographic attestation chains that survive the transition from classical to post-quantum algorithms. The interactive demonstration walks through a complete hardware verification pipeline from component receipt to deployment clearance.
What participants cover
- Physically unclonable functions (PUFs): SRAM, arbiter, and optical PUF architectures for hardware authentication
- Quantum token concepts for physical provenance tracking and anti-counterfeiting
- PQC digital signatures (ML-DSA, SLH-DSA) for firmware verification and code signing migration
- Cryptographic attestation chains: manufacturer to deployment verification under PQC transition
- Tamper detection: quantum and classical sensing approaches for hardware integrity monitoring
- End-to-end verification framework implementation for defence procurement pipelines