Post-quantum secure boot on vehicle network processors

JW Bos, B Carlson, J Renes, M Rotaru… - Cryptology ePrint …, 2022 - eprint.iacr.org
JW Bos, B Carlson, J Renes, M Rotaru, D Sprenkels, GP Waters
Cryptology ePrint Archive, 2022eprint.iacr.org
The ability to trust a system to act safely and securely strongly relies on the integrity of the
software that it runs. To guarantee authenticity of the software one can include cryptographic
data such as digital signatures on application images that can only be generated by trusted
parties. These are typically based on cryptographic primitives such as Rivest-Shamir-
Adleman (RSA) or Elliptic-Curve Cryptography (ECC), whose security will be lost whenever
a large enough quantum computer is built. For that reason, migration towards Post-Quantum …
Abstract
The ability to trust a system to act safely and securely strongly relies on the integrity of the software that it runs. To guarantee authenticity of the software one can include cryptographic data such as digital signatures on application images that can only be generated by trusted parties. These are typically based on cryptographic primitives such as Rivest-Shamir-Adleman (RSA) or Elliptic-Curve Cryptography (ECC), whose security will be lost whenever a large enough quantum computer is built. For that reason, migration towards Post-Quantum Cryptography (PQC) is necessary. This paper investigates the practical impact of migrating the secure boot flow on a Vehicle Network Processor (S32G274A) towards PQC. We create a low-memory fault-attack-resistant implementation of the Dilithium signature verification algorithm and evaluate its impact on the boot flow.
eprint.iacr.org
Showing the best result for this search. See all results