Back/Semiconductor makers, including STMicroelectronics, face demand to embed post-quantum crypto and identity controls
crypto·February 15, 2026·stm

Semiconductor makers, including STMicroelectronics, face demand to embed post-quantum crypto and identity controls

ED
Editorial
Cashu Markets·2 min read
TL;DR
  • STMicroelectronics must prioritize hardware-level support for new cryptographic standards in automotive, industrial, and IoT microcontrollers.
  • STMicroelectronics’ secure MCUs and dedicated security products could help meet rising hardware security demand.
  • Integrating post-quantum algorithms, secure firmware updates and scalable identity provisioning may require silicon revisions and tighter software integration.

Semiconductor makers face urgent pressure to embed post-quantum cryptography and stronger identity controls into device hardware as enterprise security shifts toward an identity-first model, industry sources say. Gartner’s latest security trends report finds about three-quarters of enterprise intrusions now use compromised identities rather than software exploits, undercutting perimeter-focused defenses and increasing demand for secure elements, root-of-trust modules and cryptographic agility in edge and embedded devices. For chip suppliers such as STMicroelectronics, which provide microcontrollers and secure hardware for automotive, industrial and IoT systems, the trend makes hardware-level support for new cryptographic standards a strategic priority.

Meeting that demand requires changes across product design and lifecycle processes, industry engineers and analysts add. Devices must support multiple algorithms and be updatable as standards evolve, while constrained embedded environments force trade-offs between performance, power and security. STMicroelectronics’ secure MCUs and dedicated security products are positioned to play a role, but integrating NIST-endorsed post-quantum algorithms, enabling secure firmware updates and providing scalable identity provisioning are complex tasks that can require silicon revisions and tighter integration with software identity-management stacks.

The shift also affects long-lived systems in automotive and industrial markets where “harvest now, decrypt later” threats are acute: encrypted telemetry and firmware captured today could be decrypted later when quantum capabilities mature unless endpoints and cloud services move to quantum-resistant primitives. That dynamic pushes OEMs and semiconductor suppliers to combine hardware protections with identity governance, certificate lifecycle management and cryptographic agility to protect devices over multi-year lifecycles.

Gartner further forecasts a surge in sovereign-cloud infrastructure spending as data residency rules in Europe, the Middle East and Asia–Pacific prompt governments and enterprises to adopt regionally controlled IaaS, a move that heightens demand for hardware-backed key management and verifiable cryptographic controls at the chip and platform level.

Specialist vendors and new entrants are moving to fill gaps in practical readiness. Quantum Secure Encryption Corp. is staging a webinar on post-quantum preparedness aimed at IT and security decision-makers, underscoring growing industry appetite for actionable guidance as regulators and procurement bodies push for quantum-resistant products across cloud and endpoint categories.

Cashu Markets
Cashu
Markets

By Cashu Markets. Providing market news, analysis, and research for investors worldwide.

© 2026 Cashu Technologies Pty Ltd. All rights reserved. Cashu Markets is a trademark of Cashu Technologies Pty Ltd.

The content published on Cashu Markets is for informational purposes only and should not be construed as investment advice, a recommendation, or an offer to buy or sell any securities. All opinions expressed are those of the authors and do not reflect the official position of Cashu Technologies Pty Ltd or its affiliates. Past performance is not indicative of future results. Investing involves risk, including the possible loss of principal. Always conduct your own research and consult with a qualified financial advisor before making any investment decisions.

Cashu Markets and its contributors may hold positions in securities mentioned in published content. Any such holdings will be disclosed at the time of publication. Market data is provided on an "as-is" basis and may be delayed. Cashu Technologies Pty Ltd does not guarantee the accuracy, completeness, or timeliness of any information presented.

Cashu Markets
Cashu
Markets

Setting up your session...