A Survey of Post-Quantum Cryptography Migration in Vehicles

被引:0
|
作者
Lohmiller, Nils [1 ]
Kaniewski, Sabrina [1 ]
Menth, Michael [2 ]
Heer, Tobias [1 ]
机构
[1] Esslingen University of Applied Sciences, Department of Computer Science and Engineering, Esslingen,73732, Germany
[2] University of Tübingen, Chair of Communication Networks, Tübingen,72074, Germany
关键词
Quantum communication - Quantum cryptography - Quantum electronics - Quantum optics;
D O I
10.1109/ACCESS.2025.3528562
中图分类号
学科分类号
摘要
The advent of quantum computers makes asymmetric cryptographic algorithms insecure and vulnerable. A promising solution to ensure the continued security attributes of confidentiality, integrity, and availability is the use of Post-Quantum Cryptography (PQC) algorithms. The adoption of quantum-safe algorithms takes place at a vastly different pace in different industries. In some industries, adoption processes are slow due to the required adaptation of regulations and standards. At the same time, long-lived products with non-PQC algorithms are more likely to become insecure during their lifetime. Vehicles are a prime example of long-lived products where the adoption of PQC proceeds slowly. When quantum computers are able to break relevant key lengths of asymmetric cryptography and, thus, render current vehicle systems insecure, vehicles that are developed and produced today will most likely remain in use. In this work, we provide a structured and comprehensive overview of the current migration state of PQC algorithms in the automotive area. We address use cases involving asymmetric cryptography in the automotive context that face the challenge of adapting PQC, such as internal vehicle networks, manufacturer-specific communication, and vehicle-to-everything communication. In addition, we review the standards concerning vehicle security and their relevance to PQC. Finally, we identify and discuss open research challenges regarding the adoption of PQC in the automotive domain and further steps towards quantum-safe vehicles. © 2013 IEEE.
引用
收藏
页码:10160 / 10176
相关论文
共 50 条
  • [1] Post-Quantum Cryptography
    Monroe, Don
    COMMUNICATIONS OF THE ACM, 2023, 66 (02) : 15 - 17
  • [2] Post-quantum cryptography
    Bernstein, Daniel J.
    Lange, Tanja
    NATURE, 2017, 549 (7671) : 188 - 194
  • [3] Post-quantum cryptography
    Daniel J. Bernstein
    Tanja Lange
    Nature, 2017, 549 : 188 - 194
  • [4] A Survey of Post-Quantum Cryptography: Start of a New Race
    Dam, Duc-Thuan
    Tran, Thai-Ha
    Hoang, Van-Phuc
    Pham, Cong-Kha
    Hoang, Trong-Thuc
    CRYPTOGRAPHY, 2023, 7 (03)
  • [5] Post-Quantum Crystography: A Combination of Post-Quantum Cryptography and Steganography
    Gabriel, A. J.
    Alese, B. K.
    Adetunmbi, A. O.
    Adewale, O. S.
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 449 - +
  • [6] Post-Quantum Lattice-Based Cryptography Implementations: A Survey
    Nejatollahi, Hamid
    Dutt, Nikil
    Ray, Sandip
    Regazzoni, Francesco
    Banerjee, Indranil
    Cammarota, Rosario
    ACM COMPUTING SURVEYS, 2019, 51 (06)
  • [7] A Note on Quantum Security for Post-Quantum Cryptography
    Song, Fang
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 246 - 265
  • [8] A note on quantum security for post-quantum cryptography
    Song, Fang
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8772 : 246 - 265
  • [9] Post-quantum cryptography and the quantum future of cybersecurity
    Liu, Yi-Kai
    Moody, Dustin
    PHYSICAL REVIEW APPLIED, 2024, 21 (04):
  • [10] EasyPQC: Verifying Post-Quantum Cryptography
    Barbosa, Manuel
    Barthe, Gilles
    Fan, Xiong
    Gregoire, Benjamin
    Hung, Shih-Han
    Katz, Jonathan
    Strub, Pierre-Yves
    Wu, Xiaodi
    Zhou, Li
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 2564 - 2586