5G Technology World

  • 5G Technology and Engineering
  • FAQs
  • Apps
  • Devices
  • IoT
  • RF
  • Radar
  • Wireless Design
  • Learn
    • 5G Videos
    • Ebooks
    • EE Training Days
    • FAQs
    • Learning Center
    • Tech Toolboxes
    • Webinars/Digital Events
  • Handbooks
    • 2024
    • 2023
    • 2022
    • 2021
  • Resources
    • Design Guide Library
    • EE World Digital Issues
    • Engineering Diversity & Inclusion
    • Engineering Training Days
    • LEAP Awards
  • Advertise
  • Subscribe

Cybersecurity Team Testing Ternary Computing to Secure Blockchain Technology for Cryptocurrency and Other Applications

By Northern Arizona University | April 9, 2019

Cryptocurrency, or digital currency, was introduced in 2009 by Bitcoin, and the market has since expanded to include many other brands such as Ethereum, Ripple, Litecoin and Zcash.

Because it is based on unique blockchain technology, a decentralized network that doesn’t require a third party to process transactions, cryptocurrency operates independently from the global banking system. Data stored in a blockchain is permanent and cannot be modified, and it has been adapted for a wide variety of uses beyond cryptocurrency.

The privacy that users of a network based on blockchain technology have, however, is a major drawback. Because users are nearly impossible to identify, these networks attract terrorists, criminals and black market businesses who wish to remain anonymous. Some experts believe that blockchain technology poses one of the biggest potential threats to U.S. national security.

A team of cybersecurity researchers from NAU’s School of Informatics, Computing, and Cyber Systems, led by professor of practice Bertrand Cambou, was recently awarded a $125,000 grant by the U.S. Air Force Research Lab (AFRL) to study how to apply NAU’s technology to secure the blockchain with novel digital signature schemes.

Team to design, characterize and validate a working prototype

The project leverages another study recently completed by the team, funded by the AFRL and the Arizona Board of Regents, to determine the value of ternary computing—based on logic using three possible values instead of binary computing, which is based on two values—in strengthening cybersecurity. 

“The long-term objective of this project is to develop an architecture that is compatible with cloud-based solutions, providing unprecedented levels of security to the blockchain technology with ternary computing and ternary physical functions (T-PUF), which are the ‘electronic fingerprints’ of advanced nanoelectronic devices,” Cambou said.

The NAU team, which includes ITS engineer Duane Booher, cybersecurity lab manager Ian Burke and Ph.D. student Christopher Philabaum, as well as graduate and undergraduate students, will work together during this preliminary phase of the research to design, characterize and validate a working prototype demonstrating the value of ternary computing to secure blockchains.

This project is the first step of a wider multi-year research project to develop technology making blockchains resistant to quantum computer attacks, with the potential to have a significant impact on the way online transactions are protected in financial, governmental and industrial applications.

“This one-year project represents a preliminary phase to provide proof of concept of our long-term vision to secure blockchain with NAU technologies for the protection of strategic functions such as financial institutions, smart manufacturing, supply chain and inventory management,” Cambou said.

Related Articles Read More >

Second-generation tech extends range by 50 percent
Sequans announces production of latest LTE module
Transceiver supports 2.4 GHz ISM and SATCOM
Vehicles get Wi-Fi 7 with ublox module

Featured Contributions

  • Overcome Open RAN test and certification challenges
  • Wireless engineers need AI to build networks
  • Why AI chips need PCIe 7.0 IP interconnects
  • circuit board timing How timing and synchronization improve 5G spectrum efficiency
  • Wi-Fi 7 and 5G for FWA need testing
More Featured Contributions

EE TECH TOOLBOX

“ee
Tech Toolbox: Internet of Things
Explore practical strategies for minimizing attack surfaces, managing memory efficiently, and securing firmware. Download now to ensure your IoT implementations remain secure, efficient, and future-ready.

EE LEARNING CENTER

EE Learning Center
“5g
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.

Engineering Training Days

engineering
“bills
5G Technology World
  • Enews Signup
  • EE World Online
  • DesignFast
  • EDABoard Forums
  • Electro-Tech-Online Forums
  • Microcontroller Tips
  • Analogic Tips
  • Connector Tips
  • Engineer’s Garage
  • EV Engineering
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips
  • About Us
  • Contact Us
  • Advertise

Copyright © 2025 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy

Search 5G Technology World