Quantum-Resistant Cryptography for Automotive Cybersecurity: Implementing Post-Quantum Algorithms to Secure Next-Generation Autonomous and Connected Vehicles
Keywords:
Quantum-resistant cryptography, post-quantum cryptography, automotive cybersecurityAbstract
Next-generation autonomous and connected cars depend on digital communication networks and control systems, so cybersecurity becomes a major issue. Fast evolving quantum computing puts RSA, ECC, and AES under risk of compromising automobile network security. This work uses post-quantum cryptography (PQC) to discuss vehicle cybersecurity. Quantum computing compromises encryption standards, so this work offers strong PQC models for in-vehicle communication systems, V2V, and V2I.
Lattice-, hash-, code-, multivariate poisson-, and isogeny-based quantum-resistant cryptography is studied in this study. Their suitableness, performance, and fit into automobile cybersecurity systems are assessed. Since automotive systems demand low latency, real-time processing, limited computer resources, and long-term security, the advantages and drawbacks of every approach are evaluated. The paper also reveals computational cost, backward compatibility, and hybrid cryptographic configurations tough to handle between conventional and post-quantum systems.
References
J. Shor, “Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer,” SIAM Journal on Computing, vol. 26, no. 5, pp. 1484–1509, Oct. 1997.
L. K. Grover, “A fast quantum mechanical algorithm for database search,” Proceedings of the 28th Annual ACM Symposium on Theory of Computing, pp. 212–219, May 1996.
C. Gentry, “A fully homomorphic encryption scheme,” Ph.D. dissertation, Stanford University, 2009.
A. Selcuk and B. Bayraktaroglu, “Post-Quantum Cryptography: A Comprehensive Survey,” IEEE Transactions on Information Forensics and Security, vol. 17, pp. 3034–3051, Mar. 2022.
N. J. Al-Naymat and R. T. K. Biu, “Quantum Computing and Cryptography: A Survey,” IEEE Access, vol. 8, pp. 73158–73170, Apr. 2020.
K. P. McKay, “Lattice-Based Cryptography for Post-Quantum Security,” IEEE Transactions on Computers, vol. 70, no. 6, pp. 823–835, Jun. 2021.
R. J. Lipton, “Hash-Based Cryptography,” Proceedings of the 10th Annual ACM Conference on Computer and Communications Security, pp. 3–9, Nov. 2003.
V. Lyubashevsky, “On the Hardness of the Learning With Errors Problem,” Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 618–633, May 2013.
S. K. Khandelwal, “Code-Based Cryptography: An Overview,” Journal of Cryptographic Engineering, vol. 12, no. 1, pp. 61–80, Mar. 2021.
A. C. Myers, “Multivariate Polynomial Cryptography: Theory and Practice,” IEEE Transactions on Information Theory, vol. 67, no. 2, pp. 1245–1260, Feb. 2021.
NIST, “Post-Quantum Cryptography Standardization Project,” [Online]. Available: https://csrc.nist.gov/projects/post-quantum-cryptography. [Accessed: Nov. 2023].
ETSI, “ETSI Technical Report on Quantum-Resistant Cryptography,” ETSI TR 103 527, Apr. 2022.
M. D. Gruber, “Automotive Cybersecurity: An Overview of the Security Requirements for Connected Vehicles,” IEEE Transactions on Vehicular Technology, vol. 69, no. 3, pp. 3009–3020, Mar. 2020.
S. P. Nunes, “Vehicle-to-Vehicle (V2V) Communication Security Challenges,” IEEE Internet of Things Journal, vol. 7, no. 2, pp. 832–844, Feb. 2021.
C. Liu, “Vehicle-to-Infrastructure (V2I) Communication: Security Considerations and Solutions,” IEEE Transactions on Intelligent Vehicles, vol. 6, no. 4, pp. 1089–1100, Dec. 2021.
L. Wang, “In-Vehicle Communication Systems Security: A Survey,” IEEE Communications Surveys & Tutorials, vol. 23, no. 2, pp. 1023–1046, Apr. 2021.
A. A. R. O’Sullivan, “Simulation of Post-Quantum Key Exchange Protocols,” IEEE Transactions on Network and Service Management, vol. 19, no. 1, pp. 75–89, Mar. 2022.
B. L. Johnson, “Implementation and Performance Analysis of Lattice-Based Cryptography in Autonomous Vehicles,” IEEE Transactions on Vehicular Technology, vol. 70, no. 1, pp. 88–100, Jan. 2021.
K. R. Zeldovich, “Lessons Learned from Real-World Implementations of Quantum-Resistant Algorithms,” Proceedings of the IEEE Symposium on Security and Privacy, pp. 118–134, May 2023.
A. M. Brooks, “Standardization and Regulatory Challenges for Post-Quantum Cryptography,” IEEE Security & Privacy, vol. 19, no. 6, pp. 58–65, Nov. 2021.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.