Postavke privatnosti

MIT developed a chip that brings protection against quantum attacks to biomedical devices with significantly lower energy consumption

Find out how MIT’s new chip enables strong post-quantum cryptography for pacemakers, sensors, and other wireless biomedical devices, with high energy efficiency and additional protection against physical and side-channel attacks on system security.

MIT developed a chip that brings protection against quantum attacks to biomedical devices with significantly lower energy consumption
Photo by: Domagoj Skledar - illustration/ arhiva (vlastita)

New chip from MIT protects wireless biomedical devices from quantum threats

The development of quantum computing has for years been seen as a technological breakthrough that could open the door to new scientific and industrial possibilities, but at the same time seriously shake today’s security systems. It is precisely for this reason that the news from the Massachusetts Institute of Technology is attracting attention beyond the narrow circle of engineers: researchers have presented an exceptionally energy-efficient microchip that enables strong post-quantum cryptography on devices that until now have had almost no computing or energy capacity for such protection. This is a category of devices that includes pacemakers, insulin pumps, wearable sensors, and other wireless biomedical systems, that is, technology that is increasingly directly linked to a patient’s health, privacy, and everyday functioning.

The research was published by MIT News on April 23, 2026, and the paper was, according to the university, presented at the IEEE Custom Integrated Circuits Conference. The team states that the new chip is intended precisely for the most vulnerable group of so-called edge devices, that is, small systems with very limited energy consumption and memory. In practice, this means that protection no longer has to be reserved only for more powerful devices, servers, and data centers, but can also be brought down to microsystems that run on batteries, inductive power, or other strictly limited energy sources.

Why the problem is bigger than it seems at first glance

Today’s internet and digital security rely to a large extent on cryptographic methods that were developed for the world of classical computing. Such systems are still widely applicable, but for years there has been a warning that sufficiently powerful quantum computers could endanger some current protection methods, especially in the area of public-key cryptography. This is why the U.S. National Institute of Standards and Technology, NIST, finalized the first post-quantum cryptography standards back in 2024 and openly called on organizations to begin transitioning to new algorithms. NIST additionally emphasizes that the transition is necessary before quantum computers become capable enough for practical attacks on today’s encryption.

On large systems, such a transition can be planned through infrastructure and software upgrades, but with medical and other tiny connected devices the problem is significantly more complex. A pacemaker, implant, ingestible sensor, or portable biosensor must operate with very little energy, often without room for a more powerful processor, while at the same time it must communicate reliably with medical systems, applications, or other medical platforms. Adding more advanced protection to such a system traditionally also means a greater energy burden, more memory, more silicon area, and a higher cost. That is precisely why there has until now been a gap between what is desirable from a security standpoint and what is feasible at all.

What the MIT team actually developed

According to the published data, the researchers developed a custom ASIC, that is, a specialized integrated circuit, optimized for performing post-quantum cryptographic procedures with minimal energy cost. MIT states that the chip is approximately the size of the tip of a very fine needle, yet it also includes protections against physical attacks that attempt to bypass encryption and extract sensitive information from the device, such as system credentials or user identification data. This is an important detail because the threat to such devices does not come only from the theoretical possibility that a quantum computer might one day break today’s algorithms, but also from very concrete attacks on the electronics themselves, the power supply, and the behavior of the chip during operation.

Lead author Seoyoon Jang, a doctoral student in electrical engineering and computer science at MIT, pointed out that small edge devices are frequent targets precisely because power consumption constraints prevent the integration of the most advanced security levels. The paper also involved Saurav Maji, Rashmi Agrawal, Hyemin Stella Lee, Eunseok Lee, and Giovanni Traverso, a professor of mechanical engineering at MIT and a gastroenterologist at Brigham and Women’s Hospital, while the senior author of the paper is Anantha Chandrakasan, MIT’s provost and professor of electrical engineering and computer science. The composition of the team itself shows that this is not merely an academic demonstration of a chip, but a project that is trying to combine security, energy efficiency, and real medical applications.

A combination of multiple protective layers

One of the more important features of the new solution is the fact that it does not rely on only one defense mechanism. The researchers state that they built two different post-quantum cryptographic schemes into the chip in order to increase the robustness of the system and reduce the risk that a possible future weakness of an individual algorithm could compromise the entire device. In the world of security, this is especially important because the standardization of post-quantum algorithms is still going through development, evaluations, and further refinements. NIST today has finalized the first standards, but it is still working on additional alternatives and backup solutions for different usage scenarios.

Another important element is the built-in true random number generator. Such generators are crucial for the secure creation of keys and other cryptographic processes, and in many systems randomness is supplied externally, which can increase energy consumption or open new points of vulnerability. The MIT team states that with its own on-chip solution it simultaneously improved both efficiency and security compared with standard approaches.

The third protective layer relates to resistance against attacks through power consumption, known as power side-channel attacks. In such scenarios, an attacker does not necessarily try to break the mathematics of the algorithm, but instead analyzes how the device consumes energy while processing data. Changes in consumption can reveal traces of secret keys or other sensitive information. The researchers claim that they added exactly as much redundancy as needed so that the most sensitive parts of post-quantum protocols are protected, without unnecessary energy waste across the entire system.

The fourth component is an early fault detection mechanism, specifically designed for situations involving voltage disturbances. Wireless biomedical devices often operate under unstable power conditions, and such disturbances can cause interruption or failure of a security procedure. The new approach allows the chip to terminate the procedure early if it detects a voltage problem, thereby avoiding unnecessary energy consumption on an operation that is already clearly not going to be completed successfully. That detail may sound technical, but for implantable and wearable devices it can be decisive because every unit of energy saved means longer operation, less need for intervention, and greater reliability in real-world conditions.

How significant is the actual advance

MIT states that the new chip achieved between 20 and 60 times greater energy efficiency than all other post-quantum security techniques against which it was compared, while also offering a more compact footprint than many existing chips. That is the figure that explains why this development is not seen merely as just another laboratory prototype. In the field of small medical devices, increased energy efficiency does not mean only saving electricity, but also the possibility of implementing protection that until now has been too expensive in terms of resources. If the security layer is too demanding, manufacturers often cannot seriously apply it in small devices. If it is efficient enough, it opens the door to a new generation of medical electronics that is not forced to choose between operational autonomy and security.

Anantha Chandrakasan emphasizes that, at the time of transition to post-quantum approaches, it is crucial to ensure strong protection even for the devices with the fewest resources. That is precisely the broader meaning of this announcement: post-quantum security is no longer treated only as a topic for banks, government systems, and large data clouds, but also as an issue for everyday devices that physically touch the human body or continuously monitor health indicators. As medicine becomes increasingly digital and wireless, the consequences of a possible security failure also grow.

Why biomedical devices are especially sensitive

The risk with medical devices is not only a matter of privacy, although that alone is extremely important. The information processed by such systems can include health data, patient identity, device credentials, and therapy data. But the problem can also be operational: any device that communicates wirelessly becomes a potential entry point for unauthorized access attempts. In the case of devices that play a role in monitoring or delivering therapy, security is not only an IT topic but also a matter of functional reliability.

An additional challenge is created by the fact that many such devices are designed for very specific medical tasks, and not for constant adaptation to new cyber threats. Unlike a smartphone, which can be updated and recharged relatively often, an implantable or ingestible device must operate with very limited resources, often in long cycles, and sometimes without the easy possibility of frequent replacement. That is why security that can be built in already at the hardware level is especially valuable: reliance on later software compromises is reduced and protection is achieved at the very foundation of the system.

The broader technological and regulatory context

This development does not come out of nowhere. In 2024, NIST published the first finalized post-quantum standards, including standards for key exchange and digital signatures, and has repeatedly reiterated that the transition should begin as soon as possible. In its materials, NIST warns that organizations should not wait for the moment when the quantum threat becomes immediately operational, but must plan ahead because migration takes a long time, especially in systems that have complex certification, regulatory, and hardware chains.

For the medical industry, this is especially important. Devices go through not only engineering but also clinical, regulatory, and manufacturing checks, so any major change is slow and expensive. If security requirements become stricter, manufacturers will need solutions that are practical enough to survive real development conditions and product approval processes. That is precisely why MIT’s emphasis on programmability and energy efficiency may be more important than the demonstration of algorithms itself: industry is looking for solutions that can be integrated into a real product, not merely shown in an experimental environment.

Potential beyond medicine

Although the emphasis has been placed on biomedical devices, the researchers openly state that the same approach can also be applied to other sensitive edge systems, such as industrial sensors and smart inventory tags. This points to a broader trend: post-quantum security is moving from the level of large network systems to the very periphery of the digital world, where sensors, identification tags, wearable electronics, and small autonomous devices are located. These systems often have a long service life, operate in large series, and remain deployed in the field for years, which means they could face tomorrow’s security threats with today’s outdated protection methods.

If such chips prove mature enough for broader deployment, they could accelerate the transition toward more secure IoT and medical platforms without a drastic increase in energy consumption or the physical dimensions of devices. This does not mean that the quantum security problem has been solved with a single prototype, but it does mean that one of the main practical obstacles has been removed: the claim that strong post-quantum protection is simply not feasible on the smallest devices no longer sounds as convincing as it did a few years ago.

From the laboratory to real-world use

However, there are still a number of steps ahead for the team. Any technology aimed at medical application must travel the path from research demonstration to integration into a commercial system, and that process includes additional testing, adjustments, and proving reliability under different operating conditions. According to MIT, the researchers want in the future to apply the same techniques to other vulnerable applications as well as to devices with limited energy budgets. Financial support was provided, among others, by the U.S. Advanced Research Projects Agency for Health, which shows that the topic is viewed also as a matter of healthcare infrastructure, and not only computer science.

It remains to be seen how quickly such solutions will reach products that are installed in hospitals, home medical systems, and wearable devices for everyday health monitoring. But it is already clear that this is an area in which security, energy, and medicine can no longer be separated. Devices that are small, quiet, and almost invisible are becoming increasingly important for diagnosis and therapy, and that is precisely why they must be designed so that they can survive future forms of digital attacks, and not only today’s ones.

Sources:
- MIT News – original announcement about the new microchip, the composition of the research team, comparison results, and planned applications (link)
- NIST – official page on post-quantum cryptography and the call to begin migration toward new standards (link)
- NIST CSRC – overview of the post-quantum cryptography project and the status of standardizing algorithms resistant to quantum attacks (link)
- NIST News – announcement about the finalization of the first three post-quantum standards in August 2024 (link)
- IEEE CICC – official page of the conference at which, according to MIT, the paper was presented in April 2026 (link)

Find accommodation nearby

Creation time: 2 hours ago

Science & tech desk

Our Science and Technology Editorial Desk was born from a long-standing passion for exploring, interpreting, and bringing complex topics closer to everyday readers. It is written by employees and volunteers who have followed the development of science and technological innovation for decades, from laboratory discoveries to solutions that change daily life. Although we write in the plural, every article is authored by a real person with extensive editorial and journalistic experience, and deep respect for facts and verifiable information.

Our editorial team bases its work on the belief that science is strongest when it is accessible to everyone. That is why we strive for clarity, precision, and readability, without oversimplifying in a way that would compromise the quality of the content. We often spend hours studying research papers, technical documents, and expert sources in order to present each topic in a way that will interest rather than burden the reader. In every article, we aim to connect scientific insights with real life, showing how ideas from research centres, universities, and technology labs shape the world around us.

Our long experience in journalism allows us to recognize what is truly important for the reader, whether it is progress in artificial intelligence, medical breakthroughs, energy solutions, space missions, or devices that enter our everyday lives before we even imagine their possibilities. Our view of technology is not purely technical; we are also interested in the human stories behind major advances – researchers who spend years completing projects, engineers who turn ideas into functional systems, and visionaries who push the boundaries of what is possible.

A strong sense of responsibility guides our work as well. We want readers to trust the information we provide, so we verify sources, compare data, and avoid rushing to publish when something is not fully clear. Trust is built more slowly than news is written, but we believe that only such journalism has lasting value.

To us, technology is more than devices, and science is more than theory. These are fields that drive progress, shape society, and create new opportunities for everyone who wants to understand how the world works today and where it is heading tomorrow. That is why we approach every topic with seriousness but also with curiosity, because curiosity opens the door to the best stories.

Our mission is to bring readers closer to a world that is changing faster than ever before, with the conviction that quality journalism can be a bridge between experts, innovators, and all those who want to understand what happens behind the headlines. In this we see our true task: to transform the complex into the understandable, the distant into the familiar, and the unknown into the inspiring.

NOTE FOR OUR READERS
Karlobag.eu provides news, analyses and information on global events and topics of interest to readers worldwide. All published information is for informational purposes only.
We emphasize that we are not experts in scientific, medical, financial or legal fields. Therefore, before making any decisions based on the information from our portal, we recommend that you consult with qualified experts.
Karlobag.eu may contain links to external third-party sites, including affiliate links and sponsored content. If you purchase a product or service through these links, we may earn a commission. We have no control over the content or policies of these sites and assume no responsibility for their accuracy, availability or any transactions conducted through them.
If we publish information about events or ticket sales, please note that we do not sell tickets either directly or via intermediaries. Our portal solely informs readers about events and purchasing opportunities through external sales platforms. We connect readers with partners offering ticket sales services, but do not guarantee their availability, prices or purchase conditions. All ticket information is obtained from third parties and may be subject to change without prior notice. We recommend that you thoroughly check the sales conditions with the selected partner before any purchase, as the Karlobag.eu portal does not assume responsibility for transactions or ticket sale conditions.
All information on our portal is subject to change without prior notice. By using this portal, you agree to read the content at your own risk.