Some suppliers of cybersecurity solutions Adacore www.adacore.com Ansys www.ansys.com Codasip www.codasip.com ETAS www.etas.com Green Hills Software www.ghs.com HighTec EDV-Systeme www.hightec-rt.com Infineon www.infineon.com Keysight Technologies www.keysight.com LDRA www.ldra.com Lynx Software www.lynx.com Horiba MIRA www.horiba-mira.com NXP Semiconductor www.nxp.com Parasoft www.parasoft.com PQShield www.pqshield.com Renesas Electronics www.renesas.com ST Microelectronics www.st.com Tasking www.tasking.com Vector Informatik www.vector.com VicOne www.vicone.com 40 Post-quantum algorithms The US National Institute of Standards and Technology (NIST) has officially approved a new set of encryption algorithms for PQC. The result of an eight-year competition, these algorithms are used in new standards from NIST that replace current encryption methods. In the US, the NSA has already mandated that national security systems adopt PQC by 2030, while the UK’s Cyber Security Council strongly recommends implementing them. By ratifying and publishing its PQC standards, NIST is triggering a significant cybersecurity transition. Three algorithms are ready to publish with key encapsulation, technology that protects the keys and a signature to verify firmware when software has been downloaded. Digital signatures are used to prevent malware attacks, particularly for protecting downloads and updates from being intercepted and compromised. There are digital signatures and key encapsulation that lead to various use cases, and chip makers are using these in automotive chips. The deployment includes a rootof-trust that already includes PQC, so even if the requirements for security change, these can still update in a postquantum, secure way. That’s the digital signature part. Key encapsulation is more suited to protecting session keys and data from interception, but this requires agreement with developers across the whole vehicle, from the wireless gateway to the telematics unit and to the ECUs. The PQC algorithms specified by NIST are ML-KEM (formerly Kyber), ML-DSA (Dilithium) and SLH-DSA (SPHINCS+). Future The hardware and software development tools for building secure e-mobility platforms now provide a proven ecosystem that protects systems and meets regulatory requirements. This first generation of development is now evolving across the whole range of ECUs. However, there are still considerable challenges to securing e-mobility systems, from new protection algorithms to developing reliable, safe code and the available hardware that is secure by design. The threats are ever-evolving, with hackers adopting new techniques in different places, as shown by the CAN injection attacks through the headlight systems. One increasingly important area is threat intelligence. This requires sifting through vast quantities of intelligence and narrowing down the threats to something actionable to feed into development programs. This is one of the most common requests from developers and an area where AI can assist. Acknowledgements With thanks to Paul Wooderson at MIRA Horiba and Chris Smith at Green Hills Software and Ricardo Camacho at Parasoft for their assistance with this article. Tech focus | Cybersecurity March/April 2025 | E-Mobility Engineering The Keysight SA8710A Automotive Cybersecurity Test Platform is an automated, end-to-end solution for validating vehicular access interfaces in accordance with ISO/SAE 21434 and UN R155 (Image courtesy of Keysight)
RkJQdWJsaXNoZXIy MjI2Mzk4