Semiconductor makers, including STMicroelectronics, face demand to embed post-quantum crypto and identity controls
- STMicroelectronics must prioritize hardware-level support for new cryptographic standards in automotive, industrial, and IoT microcontrollers.
- STMicroelectronics’ secure MCUs and dedicated security products could help meet rising hardware security demand.
- Integrating post-quantum algorithms, secure firmware updates and scalable identity provisioning may require silicon revisions and tighter software integration.
Semiconductor makers face urgent pressure to embed post-quantum cryptography and stronger identity controls into device hardware as enterprise security shifts toward an identity-first model, industry sources say. Gartner’s latest security trends report finds about three-quarters of enterprise intrusions now use compromised identities rather than software exploits, undercutting perimeter-focused defenses and increasing demand for secure elements, root-of-trust modules and cryptographic agility in edge and embedded devices. For chip suppliers such as STMicroelectronics, which provide microcontrollers and secure hardware for automotive, industrial and IoT systems, the trend makes hardware-level support for new cryptographic standards a strategic priority.
Meeting that demand requires changes across product design and lifecycle processes, industry engineers and analysts add. Devices must support multiple algorithms and be updatable as standards evolve, while constrained embedded environments force trade-offs between performance, power and security. STMicroelectronics’ secure MCUs and dedicated security products are positioned to play a role, but integrating NIST-endorsed post-quantum algorithms, enabling secure firmware updates and providing scalable identity provisioning are complex tasks that can require silicon revisions and tighter integration with software identity-management stacks.
The shift also affects long-lived systems in automotive and industrial markets where “harvest now, decrypt later” threats are acute: encrypted telemetry and firmware captured today could be decrypted later when quantum capabilities mature unless endpoints and cloud services move to quantum-resistant primitives. That dynamic pushes OEMs and semiconductor suppliers to combine hardware protections with identity governance, certificate lifecycle management and cryptographic agility to protect devices over multi-year lifecycles.
Gartner further forecasts a surge in sovereign-cloud infrastructure spending as data residency rules in Europe, the Middle East and Asia–Pacific prompt governments and enterprises to adopt regionally controlled IaaS, a move that heightens demand for hardware-backed key management and verifiable cryptographic controls at the chip and platform level.
Specialist vendors and new entrants are moving to fill gaps in practical readiness. Quantum Secure Encryption Corp. is staging a webinar on post-quantum preparedness aimed at IT and security decision-makers, underscoring growing industry appetite for actionable guidance as regulators and procurement bodies push for quantum-resistant products across cloud and endpoint categories.