Post-quantum cryptography for ECU security use cases

  • Shor’s algorithm imposes a threat to many classical and popular cryptographic algorithms because it can leverage the computing power of a quantum computer to efficiently factorize big numbers and solve the discrete logarithm problem. Due to the Mosca theorem the chance is 50% that quantum computers with enough computation power exist by 2031 and can break all standard asymmetric cryptographic signature and encryption schemes. As a consequence, attackers would be able to spoof the cryptographic signature of over-the-air updates for electronic control units and inject manipulated firmware/software into the vehicle to execute arbitrary code. Post-quantum cryptographic (PQC) schemes are resilient against attacks exploiting Shor’s and other quantum algorithms. In this paper we analyze the constraints of promising PQC candidates (regarding the threat of quantum computers) for security use cases in the automotive domain. Practical results show that they can not only offer advantages regarding security against the future threat of quantum computers, but also outperform existing cryptographic algorithms.

Download full text files

Export metadata

Additional Services

Share in Twitter Search Google Scholar
Author:Fabio CamposGND, Michael MeyerGND, Steffen SanwaldGND, Marc StöttingerGND, Yi WangGND
Parent Title (English):17\(^{th}\) escar Europe : embedded security in cars (Konferenzveröffentlichung)
Document Type:Part of a Book
Date of Publication (online):2019/10/31
Date of first Publication:2019/10/31
Publishing Institution:Ruhr-Universität Bochum, Universitätsbibliothek
Tag:Automotive Domain; Electronic Control Unit; Post-Quantum Cryptography; Secure Software Update
First Page:155
Last Page:169
Dewey Decimal Classification:Allgemeines, Informatik, Informationswissenschaft / Informatik
open_access (DINI-Set):open_access
Konferenz-/Sammelbände:17th escar Europe : embedded security in cars
Licence (German):License LogoKeine Creative Commons Lizenz - es gelten die Rechteeinräumung und das deutsche Urheberrecht