2022
DOI: 10.3390/electronics11060856
|View full text |Cite
|
Sign up to set email alerts
|

Research on Secure Communication on In-Vehicle Ethernet Based on Post-Quantum Algorithm NTRUEncrypt

Abstract: In the context of the evolution of in-vehicle electronic and electrical architecture as well as the rapid development of quantum computers, post-quantum algorithms, such as NTRUEncrypt, are of great significance for in-vehicle secure communications. In this paper, we propose and evaluate, for the first time, a NTRUEncrypt enhanced session key negotiation for the in-vehicle Ethernet context. Specifically, the time consumption and memory occupation of the NTRUEncrypt Elliptic Curve Diffie–Hellman (ECDH), and Riv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…To address this challenge, future research directions should concentrate on implementing cryptographic algorithms resistant to quantum computing attacks, such as hash function-based message authentication code (HMAC) [34] and lattice-based encryption algorithms (NTRUEncrypt) [35]. These cryptographic algorithms demonstrate heightened resistance in the current quantum computing environment and can effectively counter potential quantum computing attacks.…”
Section: Open Challenges and Future Research Directionsmentioning
confidence: 99%
“…To address this challenge, future research directions should concentrate on implementing cryptographic algorithms resistant to quantum computing attacks, such as hash function-based message authentication code (HMAC) [34] and lattice-based encryption algorithms (NTRUEncrypt) [35]. These cryptographic algorithms demonstrate heightened resistance in the current quantum computing environment and can effectively counter potential quantum computing attacks.…”
Section: Open Challenges and Future Research Directionsmentioning
confidence: 99%
“…An important advantage of the NTRUEncrypt algorithm is its high performance compared to other asymmetric algorithms [6]. The speed of the algorithm is achieved due to the fact that the main operation in encryption is the multiplication of polynomials with a relatively low degree.…”
Section: Description Of the Ntruencrypt Algorithmmentioning
confidence: 99%
“…Based on the application requirement (e.g., minimization of latency, minimization of CAPEX/OPEX) and the traffic requirements of the end user, the MEC/Cloud Orchestrator can automatically deploy the application for both MEC provided by the private/local operator and cloud resources/platform provided by the Cloud Owner. With the above logic, it is possible to control the traffic generated by the end-user and obtain benefits such as traffic reduction, suppression of network congestion, and high security [ 62 , 63 ]. In addition, from the end user’s perspective, the application throughput in MEC is faster than during regular use on the cloud, which improves QoS/QoE.…”
Section: System Architecturementioning
confidence: 99%