The quantum-resistant cryptographic chip AHC001 jointly developed by Guoxin Technology and Zhengzhou Xinda Yimi Technology Co., Ltd. has successfully passed internal testing , which is a major breakthrough in the field of domestic quantum security.
It is understood that the AHC001 chip adopts the domestic 28nm process and is equipped with an independent CPU core, achieving a breakthrough in "high performance + low power consumption". Its typical working power consumption is only 350mW, and its static power consumption is as low as 0.13mW, which is equivalent to the energy consumption level of a smart bracelet in standby mode . This feature makes it particularly suitable for energy-sensitive scenarios such as mobile devices and edge computing nodes.
In addition, Guoxin Technology has achieved two core breakthroughs in AHC001 chip technology.
First, a reconfigurable quantum-resistant cryptographic algorithm engine is integrated into the chip , which supports the international mainstream Kyber encryption algorithm (such as Kyber512/768/1024) and Dilithium digital signature algorithm (such as Dilithium2/3/5), and is compatible with traditional algorithms such as the national encryption SM2/SM3/SM4.
Secondly, the chip has a built-in true random number generator and integrates multiple layers of protection mechanisms such as voltage detection, temperature detection, and light detection to resist side-channel attacks and hardware tampering from a physical level . In addition, its reconfigurable characteristics allow flexible switching of algorithms through instructions, leaving room for expansion for future iterations of anti-quantum standards.
In other words, the uniqueness of Guoxin Technology AHC001 lies in supporting the "dual-mode coexistence" of traditional cryptography and quantum-resistant cryptography . For example, in the financial system, existing businesses can continue to use the SM2 algorithm, while new businesses gradually migrate to the Kyber or Dilithium algorithm to avoid business interruptions caused by technology upgrades . This gradual transition strategy provides a buffer period for security upgrades for various industries.