A Survey of Post-Quantum Cryptography Migration in Vehicles

被引:0
|
作者
Lohmiller, Nils [1 ]
Kaniewski, Sabrina [1 ]
Menth, Michael [2 ]
Heer, Tobias [1 ]
机构
[1] Esslingen Univ Appl Sci, Dept Comp Sci & Engn, D-73732 Esslingen, Germany
[2] Univ Tubingen, Chair Commun Networks, D-72074 Tubingen, Germany
来源
IEEE ACCESS | 2025年 / 13卷
关键词
Cryptography; Standards; Security; Surveys; Automotive engineering; Vehicle-to-everything; Quantum computing; Public key; Computers; NIST; Post-quantum cryptography (PQC); PQC migration; vehicles; V2V; V2X; IoV;
D O I
10.1109/ACCESS.2025.3528562
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The advent of quantum computers makes asymmetric cryptographic algorithms insecure and vulnerable. A promising solution to ensure the continued security attributes of confidentiality, integrity, and availability is the use of Post-Quantum Cryptography (PQC) algorithms. The adoption of quantum-safe algorithms takes place at a vastly different pace in different industries. In some industries, adoption processes are slow due to the required adaptation of regulations and standards. At the same time, long-lived products with non-PQC algorithms are more likely to become insecure during their lifetime. Vehicles are a prime example of long-lived products where the adoption of PQC proceeds slowly. When quantum computers are able to break relevant key lengths of asymmetric cryptography and, thus, render current vehicle systems insecure, vehicles that are developed and produced today will most likely remain in use. In this work, we provide a structured and comprehensive overview of the current migration state of PQC algorithms in the automotive area. We address use cases involving asymmetric cryptography in the automotive context that face the challenge of adapting PQC, such as internal vehicle networks, manufacturer-specific communication, and vehicle-to-everything communication. In addition, we review the standards concerning vehicle security and their relevance to PQC. Finally, we identify and discuss open research challenges regarding the adoption of PQC in the automotive domain and further steps towards quantum-safe vehicles.
引用
收藏
页码:10160 / 10176
页数:17
相关论文
共 50 条
  • [41] On Feasibility of Post-Quantum Cryptography on Small Devices
    Malina, Lukas
    Popelova, Lucie
    Dzurenda, Petr
    Hajny, Jan
    Martinasek, Zdenek
    IFAC PAPERSONLINE, 2018, 51 (06): : 462 - 467
  • [42] LETTERS FOR POST-QUANTUM CRYPTOGRAPHY STANDARD EVALUATION
    Ding, Jintai
    Mesnager, Sihem
    Wang, Lih-Chung
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2020, 14 (01) : I - I
  • [43] Post-quantum cryptography: lattice identification schemes
    Silva, Rosemberg
    Cayrel, Pierre-Louis
    Buchmann, Johannes
    PUBLICATIONES MATHEMATICAE-DEBRECEN, 2011, 79 (3-4): : 729 - 748
  • [44] HTM-PQC: Hardening Cryptography Keys Under the Trend of Post-Quantum Cryptography Migration on Industrial Internet
    Meng, Lingjia
    Fu, Yu
    Zheng, Fangyu
    Wang, Mingyu
    Ma, Ziqiang
    Dong, Jiankuo
    Lin, Jingqiang
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2025,
  • [45] Experimental authentication of quantum key distribution with post-quantum cryptography
    Wang, Liu-Jun
    Zhang, Kai-Yi
    Wang, Jia-Yong
    Cheng, Jie
    Yang, Yong-Hua
    Tang, Shi-Biao
    Yan, Di
    Tang, Yan-Lin
    Liu, Zhen
    Yu, Yu
    Zhang, Qiang
    Pan, Jian-Wei
    NPJ QUANTUM INFORMATION, 2021, 7 (01)
  • [46] Network coding-based post-quantum cryptography
    Cohen A.
    D’Oliveira R.G.L.
    Salamatian S.
    Médard M.
    IEEE Journal on Selected Areas in Information Theory, 2021, 2 (01): : 49 - 64
  • [47] Post-quantum Cryptography: Code-Based Signatures
    Cayrel, Pierre-Louis
    Meziani, Mohammed
    ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2010, 6059 : 82 - 99
  • [48] The Long Road Ahead to Transition to Post-Quantum Cryptography
    La Macchia, Brian
    COMMUNICATIONS OF THE ACM, 2022, 65 (01) : 28 - 30
  • [49] Securing the future internet of things with post-quantum cryptography
    Kumar, Adarsh
    Ottaviani, Carlo
    Gill, Sukhpal Singh
    Buyya, Rajkumar
    SECURITY AND PRIVACY, 2022, 5 (02)
  • [50] Cybersecurity in Critical Infrastructures: A Post-Quantum Cryptography Perspective
    Oliva del Moral, Javier
    deMarti iOlius, Antonio
    Vidal, Gerard
    Crespo, Pedro M.
    Etxezarreta Martinez, Josu
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (18): : 30217 - 30244