Abstract
In the context of the evolution of in-vehicle electronic and electrical architecture as well as the rapid development of quantum computers, post-quantum algorithms, such as NTRUEncrypt, are of great significance for in-vehicle secure communications. In this paper, we propose and evaluate, for the first time, a NTRUEncrypt enhanced session key negotiation for the in-vehicle Ethernet context. Specifically, the time consumption and memory occupation of the NTRUEncrypt Elliptic Curve Diffie–Hellman (ECDH), and Rivest–Shamir–Adleman (RSA) algorithms, which are used for session key negotiation, are measured and compared. The result shows that, besides the NTRUEncrypt’s particular attribute of resisting quantum computer attacks, the execution speed of session key negotiation using NTRUEncrypt is 66.06 times faster than ECDH, and 1530.98 times faster than RSA at the 128-bit security level. The memory occupation of the algorithms is at the same order of magnitude. As the transport layer security (TLS) protocol can fulfill most performance requirements of the automotive industry, post-quantum enhanced session key negotiation will probably be widely used for in-vehicle Ethernet communication.
Highlights
Accepted: 7 March 2022In-vehicle secure communication is a necessary technology for the development of the Internet of Vehicles
This paper focuses on the application of the NTRUEncrypt algorithm in the session key negotiation process, and the following assumptions are made for the identity authentication function
The speed advantage of NTRUEncrypt compared to Elliptic Curve Diffie–Hellman (ECDH) and RSA is more prominent when the security level becomes higher
Summary
In-vehicle secure communication is a necessary technology for the development of the Internet of Vehicles. Asymmetric algorithms can guarantee the authenticity and non-repudiation of data for in-vehicle security communication and have an irreplaceable role. With the development of quantum computers, the mathematical problems on which RSA or ECC is based will be deciphered. Quantum computers, based on the Shor algorithm [1], can decipher RSA and ECC algorithms. Lattice-Based Public-Key Cryptographic algorithm (LB-PKC), which has the characteristics of simple structure and fast execution, is an important category of post-quantum algorithms. RSA or ECDH is used to generate session keys in TLS [5]. It is unsafe when faced with the future quantum computers that run the Shor algorithm. The NTRUEncrypt-based in-vehicle session key negotiation scheme can resist this kind of quantum computer
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.