A Survey of Post-Quantum Cryptography Migration in Vehicles

被引:0
|
作者
Lohmiller, Nils [1 ]
Kaniewski, Sabrina [1 ]
Menth, Michael [2 ]
Heer, Tobias [1 ]
机构
[1] Esslingen University of Applied Sciences, Department of Computer Science and Engineering, Esslingen,73732, Germany
[2] University of Tübingen, Chair of Communication Networks, Tübingen,72074, Germany
关键词
Quantum communication - Quantum cryptography - Quantum electronics - Quantum optics;
D O I
10.1109/ACCESS.2025.3528562
中图分类号
学科分类号
摘要
The advent of quantum computers makes asymmetric cryptographic algorithms insecure and vulnerable. A promising solution to ensure the continued security attributes of confidentiality, integrity, and availability is the use of Post-Quantum Cryptography (PQC) algorithms. The adoption of quantum-safe algorithms takes place at a vastly different pace in different industries. In some industries, adoption processes are slow due to the required adaptation of regulations and standards. At the same time, long-lived products with non-PQC algorithms are more likely to become insecure during their lifetime. Vehicles are a prime example of long-lived products where the adoption of PQC proceeds slowly. When quantum computers are able to break relevant key lengths of asymmetric cryptography and, thus, render current vehicle systems insecure, vehicles that are developed and produced today will most likely remain in use. In this work, we provide a structured and comprehensive overview of the current migration state of PQC algorithms in the automotive area. We address use cases involving asymmetric cryptography in the automotive context that face the challenge of adapting PQC, such as internal vehicle networks, manufacturer-specific communication, and vehicle-to-everything communication. In addition, we review the standards concerning vehicle security and their relevance to PQC. Finally, we identify and discuss open research challenges regarding the adoption of PQC in the automotive domain and further steps towards quantum-safe vehicles. © 2013 IEEE.
引用
收藏
页码:10160 / 10176
相关论文
共 50 条
  • [21] Transitioning organizations to post-quantum cryptography
    Joseph, David
    Misoczki, Rafael
    Manzano, Marc
    Tricot, Joe
    Pinuaga, Fernando Dominguez
    Lacombe, Olivier
    Leichenauer, Stefan
    Hidary, Jack
    Venables, Phil
    Hansen, Royal
    NATURE, 2022, 605 (7909) : 237 - 243
  • [22] Post-quantum cryptography: lattice signatures
    Johannes Buchmann
    Richard Lindner
    Markus Rückert
    Michael Schneider
    Computing, 2009, 85 : 105 - 125
  • [23] Survey of Side-channel Attacks and Countermeasures on Post-quantum Cryptography
    Wu W.-B.
    Liu Z.
    Yang H.
    Zhang J.-P.
    Ruan Jian Xue Bao/Journal of Software, 2021, 32 (04): : 1165 - 1185
  • [24] Post-Quantum Cryptography Challenges in Connected Vehicles with V2X
    Luo, Ge
    Liu, Jianxin
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 205 - 208
  • [25] Post-quantum cryptography: lattice signatures
    Buchmann, Johannes
    Lindner, Richard
    Rueckert, Markus
    Schneider, Michael
    COMPUTING, 2009, 85 (1-2) : 105 - 125
  • [26] FPGA Accelerated Post-Quantum Cryptography
    Li, He
    Tang, Yongming
    Que, Zhiqiang
    Zhang, Jiliang
    IEEE TRANSACTIONS ON NANOTECHNOLOGY, 2022, 21 : 685 - 691
  • [27] Post-Quantum Cryptography in WireGuard VPN
    Kniep, Quentin M.
    Mueller, Wolf
    Redlich, Jens-Peter
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (SECURECOMM 2020), PT II, 2020, 336 : 261 - 267
  • [28] Implementing Post-quantum Cryptography for Developers
    Hekkala, Julius
    Halunen, Kimmo
    Vallivaara, Visa
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 73 - 83
  • [29] Designing and Delivering a Post-Quantum Cryptography Course
    Borrelli, Thomas J.
    Polak, Monika
    Radziszowski, Stanislaw
    PROCEEDINGS OF THE 55TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, SIGCSE 2024, VOL. 1, 2024, : 137 - 143
  • [30] Homomorphic Encryption Based on Post-Quantum Cryptography
    Chen, Abel C. H.
    2023 IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLIED NETWORK TECHNOLOGIES, ICMLANT, 2023, : 56 - 60