SciTransfer
FutureTPM · Project

Quantum-Proof Security Chips to Protect Banking and Devices Against Future Cyberattacks

digitalTestedTRL 5

Right now, every laptop and server has a tiny security chip called a TPM — think of it as the lock on your front door. The problem is that quantum computers, expected within 15 years, will be able to pick those locks in seconds. FutureTPM built new lock designs that even quantum computers can't crack, and tested them in real scenarios like online banking and device management. They delivered working software versions of these quantum-proof security modules so manufacturers can start upgrading before the threat arrives.

By the numbers
15 years
Predicted timeline before quantum computers can break current encryption
17
Consortium partners across Europe
10
Countries represented in the consortium
EUR 4,868,890
EU funding for quantum-resistant TPM development
22
Total project deliverables produced
9
Industry partners in the consortium
The business problem

What needed solving

Every company that relies on encryption — banks, cloud providers, device manufacturers — faces a ticking clock. Quantum computers, expected within 15 years, will be able to break the cryptographic algorithms that protect today's TPM security chips, HSMs, and trusted execution environments. Companies that wait until quantum computers arrive will face emergency replacements of deeply embedded security infrastructure at enormous cost and risk.

The solution

What was built

The project delivered a first version of software-based quantum-resistant Trusted Platform Module (QR TPM) and TPM Software Stack (QR TSS). Across 22 deliverables, the team designed, implemented, and formally verified quantum-proof cryptographic algorithms suitable for TPMs, HSMs, and TEEs, validated through use cases in online banking, activity tracking, and device management.

Audience

Who needs this

Banks and payment processors upgrading security infrastructure against quantum threatsCloud providers and data centers managing HSMs and encryption key storageConnected device manufacturers embedding TPMs in IoT and industrial productsCybersecurity vendors building post-quantum security productsGovernment and defense IT departments with long-term data protection requirements
Business applications

Who can put this to work

Financial Services & Banking
enterprise
Target: Banks and fintech companies running online banking platforms

If you are a bank worried about the security of your online banking infrastructure — this project developed quantum-resistant cryptographic algorithms tested specifically in online banking use cases. With quantum computers predicted within 15 years, early adoption means your security hardware won't need emergency replacement when the threat materializes. The consortium of 17 partners across 10 countries validated the approach with working software implementations.

Cloud & Data Center Infrastructure
enterprise
Target: Cloud providers and companies managing hardware security modules (HSMs)

If you run data centers that rely on TPMs and HSMs to protect encryption keys — this project built quantum-resistant replacements that work in hardware, software, and virtualized environments. Since TPMs share core functions with HSMs and TEEs, the FutureTPM solution directly applies to your security infrastructure. The project delivered 22 deliverables including a first working software-based quantum-resistant TPM.

IoT & Connected Device Manufacturing
any
Target: Manufacturers of connected devices, industrial controllers, and smart infrastructure

If you manufacture connected devices that use trusted platform modules for security — this project created quantum-proof algorithms designed to run on the same constrained hardware your devices already use. The device management use case was specifically validated during the project. With 9 industry partners and 4 SMEs in the consortium, the solutions were designed with real manufacturing constraints in mind.

Frequently asked

Quick answers

What would it cost to implement quantum-resistant security in our products?

The project received EUR 4,868,890 in EU funding across 17 partners to develop these algorithms and software implementations. Licensing or integration costs would depend on negotiations with the consortium partners. The software-based implementation path is likely more cost-effective than hardware redesigns.

Can this scale to protect millions of devices or transactions?

The project tested implementations across hardware, software, and virtualization environments, covering diverse deployment scales. Use cases included online banking (high-volume transactions) and device management (large fleets). Performance evaluation was part of the core deliverables, though specific throughput numbers are not available in the public data.

Who owns the IP and how can we license this technology?

The consortium of 17 partners across 10 countries includes 9 industry players and 4 SMEs. IP ownership follows EU Horizon 2020 rules, meaning each partner owns the results they generated. The coordinator, Technikon (Austria, SME), would be the starting point for licensing discussions.

Does this align with upcoming security regulations?

A key objective was contributing to standardization at EU level within TCG, ISO/IEC, and ETSI. This means the algorithms were designed to meet emerging standards for post-quantum cryptography. Early adopters would be ahead of regulatory requirements as quantum-resistance becomes mandatory.

How soon could we integrate this into existing systems?

The project delivered a first version of software-based quantum-resistant TPM and TSS (TPM Software Stack). This means integration into software environments could begin relatively quickly. Hardware TPM integration would require chip manufacturer involvement and longer development cycles.

Does this work with our existing security infrastructure?

The project specifically designed solutions for all three TPM deployment environments: hardware, software, and virtualization. Since the solution also benefits HSMs and TEEs, it is designed to complement rather than replace existing security infrastructure. Based on available project data, backward compatibility was a design consideration.

Consortium

Who built it

The FutureTPM consortium brings together 17 partners from 10 countries, with a strong industry orientation — 9 industry partners (53% ratio) including 4 SMEs, alongside 6 universities and 1 research organization. This balanced mix means the quantum-resistant algorithms were developed by crypto researchers but stress-tested by companies that actually build and ship TPM products. The coordinator, Technikon from Austria, is itself an SME, which suggests practical commercialization awareness. Partners span Western and Southern Europe plus the UK, covering major markets for security hardware. The geographic and sectoral diversity indicates broad applicability, though the project ended in 2020 and follow-up commercialization status would need to be verified.

How to reach the team

Technikon Forschungs- und Planungsgesellschaft MBH, Austria (SME) — project coordinator

Next steps

Talk to the team behind this work.

Want to explore quantum-resistant security solutions from EU research? SciTransfer can connect you with the right consortium partners and help you evaluate fit for your infrastructure.