A Survey of Post-Quantum Cryptography Migration in Vehicles

被引:0
|
作者
Lohmiller, Nils [1 ]
Kaniewski, Sabrina [1 ]
Menth, Michael [2 ]
Heer, Tobias [1 ]
机构
[1] Esslingen Univ Appl Sci, Dept Comp Sci & Engn, D-73732 Esslingen, Germany
[2] Univ Tubingen, Chair Commun Networks, D-72074 Tubingen, Germany
来源
IEEE ACCESS | 2025年 / 13卷
关键词
Cryptography; Standards; Security; Surveys; Automotive engineering; Vehicle-to-everything; Quantum computing; Public key; Computers; NIST; Post-quantum cryptography (PQC); PQC migration; vehicles; V2V; V2X; IoV;
D O I
10.1109/ACCESS.2025.3528562
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The advent of quantum computers makes asymmetric cryptographic algorithms insecure and vulnerable. A promising solution to ensure the continued security attributes of confidentiality, integrity, and availability is the use of Post-Quantum Cryptography (PQC) algorithms. The adoption of quantum-safe algorithms takes place at a vastly different pace in different industries. In some industries, adoption processes are slow due to the required adaptation of regulations and standards. At the same time, long-lived products with non-PQC algorithms are more likely to become insecure during their lifetime. Vehicles are a prime example of long-lived products where the adoption of PQC proceeds slowly. When quantum computers are able to break relevant key lengths of asymmetric cryptography and, thus, render current vehicle systems insecure, vehicles that are developed and produced today will most likely remain in use. In this work, we provide a structured and comprehensive overview of the current migration state of PQC algorithms in the automotive area. We address use cases involving asymmetric cryptography in the automotive context that face the challenge of adapting PQC, such as internal vehicle networks, manufacturer-specific communication, and vehicle-to-everything communication. In addition, we review the standards concerning vehicle security and their relevance to PQC. Finally, we identify and discuss open research challenges regarding the adoption of PQC in the automotive domain and further steps towards quantum-safe vehicles.
引用
收藏
页码:10160 / 10176
页数:17
相关论文
共 50 条
  • [1] A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies
    Hasan, Khondokar Fida
    Simpson, Leonie
    Baee, Mir Ali Rezazadeh
    Islam, Chadni
    Rahman, Ziaur
    Armstrong, Warren
    Gauravaram, Praveen
    McKague, Matthew
    IEEE ACCESS, 2024, 12 : 23427 - 23450
  • [2] HTM-PQC: Hardening Cryptography Keys Under the Trend of Post-Quantum Cryptography Migration on Industrial Internet
    Meng, Lingjia
    Fu, Yu
    Zheng, Fangyu
    Wang, Mingyu
    Ma, Ziqiang
    Dong, Jiankuo
    Lin, Jingqiang
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2025, : 3504 - 3514
  • [3] Future-Proofing Security for UAVs With Post-Quantum Cryptography: A Review
    Khan, Muhammad Asghar
    Javaid, Shumaila
    Mohsan, Syed Agha Hassnain
    Tanveer, Muhammad
    Ullah, Insaf
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2024, 5 : 6849 - 6871
  • [4] A Survey and Comparison of Post-Quantum and Quantum Blockchains
    Yang, Zebo
    Alfauri, Haneen
    Farkiani, Behrooz
    Jain, Raj
    Di Pietro, Roberto
    Erbad, Aiman
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2024, 26 (02): : 967 - 1002
  • [5] A Toolchain for Assisting Migration of Software Executables Towards Post-Quantum Cryptography
    Rattanavipanon, Norrathep
    Suaboot, Jakapan
    Werapun, Warodom
    IEEE ACCESS, 2025, 13 : 4368 - 4380
  • [6] A Survey of Post-Quantum Cryptography: Start of a New Race
    Dam, Duc-Thuan
    Tran, Thai-Ha
    Hoang, Van-Phuc
    Pham, Cong-Kha
    Hoang, Trong-Thuc
    CRYPTOGRAPHY, 2023, 7 (03)
  • [7] Securing the future internet of things with post-quantum cryptography
    Kumar, Adarsh
    Ottaviani, Carlo
    Gill, Sukhpal Singh
    Buyya, Rajkumar
    SECURITY AND PRIVACY, 2022, 5 (02)
  • [8] Post-Quantum Crystography: A Combination of Post-Quantum Cryptography and Steganography
    Gabriel, A. J.
    Alese, B. K.
    Adetunmbi, A. O.
    Adewale, O. S.
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 449 - +
  • [9] Hybrid Keys in Practice: Combining Classical, Quantum and Post-Quantum Cryptography
    Ricci, Sara
    Dobias, Patrik
    Malina, Lukas
    Hajny, Jan
    Jedlicka, Petr
    IEEE ACCESS, 2024, 12 : 23206 - 23219
  • [10] A Flexible NTT-Based Multiplier for Post-Quantum Cryptography
    Koleci, Kristjane
    Mazzetti, Paolo
    Martina, Maurizio
    Masera, Guido
    IEEE ACCESS, 2023, 11 : 3338 - 3351