A Survey of Post-Quantum Cryptography Migration in Vehicles

被引:0
|
作者
Lohmiller, Nils [1 ]
Kaniewski, Sabrina [1 ]
Menth, Michael [2 ]
Heer, Tobias [1 ]
机构
[1] Esslingen Univ Appl Sci, Dept Comp Sci & Engn, D-73732 Esslingen, Germany
[2] Univ Tubingen, Chair Commun Networks, D-72074 Tubingen, Germany
来源
IEEE ACCESS | 2025年 / 13卷
关键词
Cryptography; Standards; Security; Surveys; Automotive engineering; Vehicle-to-everything; Quantum computing; Public key; Computers; NIST; Post-quantum cryptography (PQC); PQC migration; vehicles; V2V; V2X; IoV;
D O I
10.1109/ACCESS.2025.3528562
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The advent of quantum computers makes asymmetric cryptographic algorithms insecure and vulnerable. A promising solution to ensure the continued security attributes of confidentiality, integrity, and availability is the use of Post-Quantum Cryptography (PQC) algorithms. The adoption of quantum-safe algorithms takes place at a vastly different pace in different industries. In some industries, adoption processes are slow due to the required adaptation of regulations and standards. At the same time, long-lived products with non-PQC algorithms are more likely to become insecure during their lifetime. Vehicles are a prime example of long-lived products where the adoption of PQC proceeds slowly. When quantum computers are able to break relevant key lengths of asymmetric cryptography and, thus, render current vehicle systems insecure, vehicles that are developed and produced today will most likely remain in use. In this work, we provide a structured and comprehensive overview of the current migration state of PQC algorithms in the automotive area. We address use cases involving asymmetric cryptography in the automotive context that face the challenge of adapting PQC, such as internal vehicle networks, manufacturer-specific communication, and vehicle-to-everything communication. In addition, we review the standards concerning vehicle security and their relevance to PQC. Finally, we identify and discuss open research challenges regarding the adoption of PQC in the automotive domain and further steps towards quantum-safe vehicles.
引用
收藏
页码:10160 / 10176
页数:17
相关论文
共 50 条
  • [21] Transitioning organizations to post-quantum cryptography
    Joseph, David
    Misoczki, Rafael
    Manzano, Marc
    Tricot, Joe
    Pinuaga, Fernando Dominguez
    Lacombe, Olivier
    Leichenauer, Stefan
    Hidary, Jack
    Venables, Phil
    Hansen, Royal
    NATURE, 2022, 605 (7909) : 237 - 243
  • [22] Research Trends in Post-quantum Cryptography
    Xagawa, Keita
    NTT Tech. Rev., 2019, 3 (22-26): : 22 - 26
  • [23] Transitioning organizations to post-quantum cryptography
    David Joseph
    Rafael Misoczki
    Marc Manzano
    Joe Tricot
    Fernando Dominguez Pinuaga
    Olivier Lacombe
    Stefan Leichenauer
    Jack Hidary
    Phil Venables
    Royal Hansen
    Nature, 2022, 605 : 237 - 243
  • [24] Recent Developments in Post-Quantum Cryptography
    Takagi, Tsuyoshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (01) : 3 - 11
  • [25] Survey of Side-channel Attacks and Countermeasures on Post-quantum Cryptography
    Wu W.-B.
    Liu Z.
    Yang H.
    Zhang J.-P.
    Ruan Jian Xue Bao/Journal of Software, 2021, 32 (04): : 1165 - 1185
  • [26] Post-quantum cryptography: lattice signatures
    Buchmann, Johannes
    Lindner, Richard
    Rueckert, Markus
    Schneider, Michael
    COMPUTING, 2009, 85 (1-2) : 105 - 125
  • [27] FPGA Accelerated Post-Quantum Cryptography
    Li, He
    Tang, Yongming
    Que, Zhiqiang
    Zhang, Jiliang
    IEEE TRANSACTIONS ON NANOTECHNOLOGY, 2022, 21 : 685 - 691
  • [28] Post-Quantum Cryptography in WireGuard VPN
    Kniep, Quentin M.
    Mueller, Wolf
    Redlich, Jens-Peter
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (SECURECOMM 2020), PT II, 2020, 336 : 261 - 267
  • [29] Implementing Post-quantum Cryptography for Developers
    Hekkala, Julius
    Halunen, Kimmo
    Vallivaara, Visa
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 73 - 83
  • [30] Post-Quantum Cryptography Challenges in Connected Vehicles with V2X
    Luo, Ge
    Liu, Jianxin
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 205 - 208