2022
DOI: 10.3390/cryptography6040048
|View full text |Cite
|
Sign up to set email alerts
|

Post Quantum Design in SPDM for Device Authentication and Key Establishment

Abstract: The Security Protocol and Data Model (SPDM) defines a set of flows whose purpose includes the authentication of a computing device’s hardware identity. SPDM also allows for the creation of a secure session wherein data communication between two devices has both confidentiality and integrity protection. The present version of SPDM, namely version 1.2, relies upon traditional asymmetric cryptographic algorithms, and these algorithms are known to be vulnerable to quantum attacks. This paper describes the means by… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 32 publications
0
4
0
Order By: Relevance
“…Prior works on PQC in embedded systems and wireless networks are more closely related to our work on V2V. However, many existing works on embedded systems (e.g., [23], [24], [25], [26], [27]) do not consider the above constraints; for wireless systems, PQC has mostly been considered only for key exchange or encryption (in contrast to our focus on authentication) as in [19] (PQ key establishment protocols to encrypt 5G identifiers) and [73] (encryption for video streaming systems). In the vehicular domain, PQC is scantly represented.…”
Section: Related Workmentioning
confidence: 91%
See 3 more Smart Citations
“…Prior works on PQC in embedded systems and wireless networks are more closely related to our work on V2V. However, many existing works on embedded systems (e.g., [23], [24], [25], [26], [27]) do not consider the above constraints; for wireless systems, PQC has mostly been considered only for key exchange or encryption (in contrast to our focus on authentication) as in [19] (PQ key establishment protocols to encrypt 5G identifiers) and [73] (encryption for video streaming systems). In the vehicular domain, PQC is scantly represented.…”
Section: Related Workmentioning
confidence: 91%
“…We denote the i-th message by BSM i and its signature by sig i , packed into spdu i . The first stage (lines 3-11) and last stage (lines [25][26][27][28][29][30][31] are the same as for the ECDSA-based design conditioned on the Boolean value b c . This value is 1 if the entire hybrid certificate has been received and verified by the receiver within the five minutes that the pseudonym certificate has been used, (i.e., b c is set to 1 in line 18).…”
Section: Informal Descriptionmentioning
confidence: 99%
See 2 more Smart Citations
“…The SPDM relies on asymmetric cryptography and public-key certificates for authentication. A post-quantum design is proposed in [30].…”
Section: Threat Model and An Overview Of Spdm Protocolmentioning
confidence: 99%