Secure systems

Alternative Computing Architectures (ARA)

Background

Alternative computing architectures refer to computing architectures that go beyond the current architecture of binary logic on semiconductor chips.

This includes logical models such as analogue computing, ternary computing, symbolic computing or reservoir computing. It also includes physical implementations such as optical computing, DNA computing, physarum computing (mushrooms), neuromorphic computing or orgonoid intelligence. Quantum computing is also a type of alternative computer architecture, but it is not considered in this project as quantum computers are dealt with separately.

With the increasing importance and spread of computing technologies in society in general and for security in particular, current technologies are reaching their physical limits. To achieve further improvements, new computing architectures need to be considered. These new architectures could enable new capabilities by being better suited to certain types of problems. They could also be more resistant to specific physical and logical attack vectors. The current production of semiconductors is also complicated and depends on strategic raw materials. New architectures could reduce or eliminate this need and enable strategic independence. Finally, more efficient computers could eliminate the need for a complex and constant power supply, which can play a crucial role on the (battle) field.

Aim

This program aims to support Germany’s technological and strategic independence – both for the general public and for the security authorities. In addition, this research can secure expertise for potential new future industries.

As there are a large number of computer architectures, the program is divided into two parts:

Part I – Preliminary Study: a first part will be a preliminary study in which a framework will be created to collect and compare the different architectures and match them with current and future security-related needs and use cases.

Part II – Main project: Based on the results of the preliminary study, a separate research competition is planned to analyze the individual architectures. The content, form, duration and other details are still to be determined, also depending on the results of the preliminary study.

Disruptive Risk Research

The risk of this research program lies in the fact that current computer technologies are already established and intensively researched. It is therefore very likely that the untested technologies investigated in this program will not be able to keep pace with existing technologies.

Questions about the programme? Please write to us:

  1. Program team: Secure Systems | Secure Hardware and Supply Chains
  2. E-Mail: ara-vorstudie@cyberagentur.de

Newsletter

Your update on research, awarding and co.

Subscribe to our scientific newsletter. In this way, you can find out promptly which research projects we are currently awarding, when partnering events, symposia or ideas competitions are coming up and what’s new in research.