Workshop Description
Supply chain attacks against intelligence organisations carry uniquely severe consequences. A compromised encryption device exposes sources and methods. Tampered surveillance equipment provides unreliable intelligence or, worse, becomes a collection vector against the deploying agency. Classical verification methods (visual inspection, electrical testing, PKI-based attestation) face quantum-era challenges: the signature schemes underlying firmware verification will be broken by quantum computers, and classical authentication methods cannot provide the physical unclonability that PUF technology offers.
This workshop covers physically unclonable functions (PUFs) for hardware authentication, quantum token concepts for provenance tracking, PQC digital signatures (ML-DSA, SLH-DSA) for firmware and software integrity verification, and end-to-end cryptographic attestation chains from manufacturer to deployment. The interactive demonstration walks through a complete equipment verification pipeline designed for intelligence community requirements, including chain-of-custody tracking and tamper-evidence assessment.
What participants cover
- PUF technology for intelligence equipment authentication: SRAM, arbiter, and optical PUF implementations
- Quantum token concepts for physical provenance tracking and anti-counterfeiting in intelligence supply chains
- PQC firmware signing: ML-DSA and SLH-DSA for equipment software integrity verification
- Cryptographic attestation chains: manufacturer to deployment with intelligence community custody requirements
- Tamper detection: quantum and classical sensing approaches for equipment integrity monitoring
- Adversary supply chain attack vectors: documented intelligence community incidents and countermeasures