## Post-quantum cryptography for ECU security use cases

• Shor’s algorithm imposes a threat to many classical and popular cryptographic algorithms because it can leverage the computing power of a quantum computer to efficiently factorize big numbers and solve the discrete logarithm problem. Due to the Mosca theorem the chance is 50% that quantum computers with enough computation power exist by 2031 and can break all standard asymmetric cryptographic signature and encryption schemes. As a consequence, attackers would be able to spoof the cryptographic signature of over-the-air updates for electronic control units and inject manipulated firmware/software into the vehicle to execute arbitrary code. Post-quantum cryptographic (PQC) schemes are resilient against attacks exploiting Shor’s and other quantum algorithms. In this paper we analyze the constraints of promising PQC candidates (regarding the threat of quantum computers) for security use cases in the automotive domain. Practical results show that they can not only offer advantages regarding security against the future threat of quantum computers, but also outperform existing cryptographic algorithms.

Author: Fabio CamposGND, Michael MeyerGND, Steffen SanwaldGND, Marc StöttingerGND, Yi WangGND urn:nbn:de:hbz:294-66730 https://doi.org/10.13154/294-6673 17$$^{th}$$ escar Europe : embedded security in cars (Konferenzveröffentlichung) Part of a Book English 2019/10/31 2019/10/31 Ruhr-Universität Bochum, Universitätsbibliothek Automotive Domain; Electronic Control Unit; Post-Quantum Cryptography; Secure Software Update 155 169 Allgemeines, Informatik, Informationswissenschaft / Informatik open_access 17th escar Europe : embedded security in cars Keine Creative Commons Lizenz - es gelten die Rechteeinräumung und das deutsche Urheberrecht