Abstract

In the context of the evolution of in-vehicle electronic and electrical architecture as well as the rapid development of quantum computers, post-quantum algorithms, such as NTRUEncrypt, are of great significance for in-vehicle secure communications. In this paper, we propose and evaluate, for the first time, a NTRUEncrypt enhanced session key negotiation for the in-vehicle Ethernet context. Specifically, the time consumption and memory occupation of the NTRUEncrypt Elliptic Curve Diffie–Hellman (ECDH), and Rivest–Shamir–Adleman (RSA) algorithms, which are used for session key negotiation, are measured and compared. The result shows that, besides the NTRUEncrypt’s particular attribute of resisting quantum computer attacks, the execution speed of session key negotiation using NTRUEncrypt is 66.06 times faster than ECDH, and 1530.98 times faster than RSA at the 128-bit security level. The memory occupation of the algorithms is at the same order of magnitude. As the transport layer security (TLS) protocol can fulfill most performance requirements of the automotive industry, post-quantum enhanced session key negotiation will probably be widely used for in-vehicle Ethernet communication.

Highlights

  • Accepted: 7 March 2022In-vehicle secure communication is a necessary technology for the development of the Internet of Vehicles

  • This paper focuses on the application of the NTRUEncrypt algorithm in the session key negotiation process, and the following assumptions are made for the identity authentication function

  • The speed advantage of NTRUEncrypt compared to Elliptic Curve Diffie–Hellman (ECDH) and RSA is more prominent when the security level becomes higher

Read more

Summary

Introduction

In-vehicle secure communication is a necessary technology for the development of the Internet of Vehicles. Asymmetric algorithms can guarantee the authenticity and non-repudiation of data for in-vehicle security communication and have an irreplaceable role. With the development of quantum computers, the mathematical problems on which RSA or ECC is based will be deciphered. Quantum computers, based on the Shor algorithm [1], can decipher RSA and ECC algorithms. Lattice-Based Public-Key Cryptographic algorithm (LB-PKC), which has the characteristics of simple structure and fast execution, is an important category of post-quantum algorithms. RSA or ECDH is used to generate session keys in TLS [5]. It is unsafe when faced with the future quantum computers that run the Shor algorithm. The NTRUEncrypt-based in-vehicle session key negotiation scheme can resist this kind of quantum computer

Related Research
Future
Choosing NTRU Variation Algorithm
Use Cases of NTRUEncrypt of In-Vehicle Ethernet Communication
Function of NTRUEncrypt Algorithm in TLS
Mathematical Background of NTRU
Public Parameters
Key Generation
Encryption
Decryption
Experiment Principle such as for in-vehicle domain controllers and advanced gateways
Experiment Equipment and Settings
Experiment
Experiment Results and
Execution Time of Algorithms of some in-vehicle applications where
Execution Time of Algorithms
Memory Occupation of Algorithms
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.