Applications of Pairing-Based Cryptography on Automotive-Grade Microcontrollers

  • Tudor Andreica
  • Bogdan GrozaEmail author
  • Pal-Stefan Murvay
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11094)


Bilinear pairings have been successfully used both in cryptanalysis and in the design of new cryptographic primitives, e.g., identity based encryptions and signatures. In this work we discuss some computational results for pairing-based libraries on two automotive-grade controllers as well as on an Android smart-phone. This is relevant as the computational resources of automotive-grade controllers have surged in the recent years and Android-based units are quickly entering the car market, e.g., infotainment units. Identity-based primitives open road for representative applications in automotive-based scenarios where the identity of the vehicle or of the OEM may be used for deriving public keys without relying on PKI. We discuss three potential use-cases: the security of in-vehicle buses, vehicle-to-vehicle communications and software updates that could greatly benefit from compact signatures, identity based encryption or signing as well as from group signatures.


Documentary Unit Android Smart Phone Software Updates Body Control Module Pairing-Based Cryptography Library 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.



We thank the reviewers for helpful comments that improved our work. This work was supported by a grant of the Romanian Ministry of Research and Innovation, CNCS-UEFISCDI, project number PN-III-P1-1.1.-TE-2016-1317 within PNCDI III (2018–2020).


  1. 1.
    AUTOSAR: Specification of Crypto Abstraction Library, 4.2.2 edition (2015)Google Scholar
  2. 2.
    AUTOSAR: Specification of Crypto Service Manager, 4.2.2 edition (2015)Google Scholar
  3. 3.
    Boneh, D., Boyen, X.: Secure identity based encryption without random oracles. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 443–459. Springer, Heidelberg (2004). Scholar
  4. 4.
    Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41–55. Springer, Heidelberg (2004). Scholar
  5. 5.
    Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). Scholar
  6. 6.
    Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. J. Cryptol. 17, 297–319 (2004)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Checkoway, S., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security Symposium, San Francisco (2011)Google Scholar
  8. 8.
    De Caro, A., Iovino, V.: jPBC: Java pairing based cryptography. In: Proceedings of the 16th IEEE Symposium on Computers and Communications, ISCC 2011, Kerkyra, pp. 850–855, 28 June–1 July 2011. IEEE (2011)Google Scholar
  9. 9.
    Dhondge, K., Song, S., Choi, B.-Y., Park, H.: WiFiHonk: smartphone-based beacon stuffed WiFi Car2X-communication system for vulnerable road user safety. In: IEEE 79th Vehicular Technology Conference (VTC Spring), pp. 1–5. IEEE (2014)Google Scholar
  10. 10.
    Groza, B., Briceag, C.: A vehicle collision-warning system based on multipeer connectivity and off-the-shelf smart-devices. In: Cuppens, N., Cuppens, F., Lanet, J.-L., Legay, A., Garcia-Alfaro, J. (eds.) CRiSIS 2017. LNCS, vol. 10694, pp. 115–123. Springer, Cham (2018). Scholar
  11. 11.
    Groza, B., Murvay, P.-S.: Security solutions for the controller area network: bringing authentication to in-vehicle networks. IEEE Veh. Technol. Mag. 13(1), 40–47 (2018)CrossRefGoogle Scholar
  12. 12.
    Harding, J., et al.: Vehicle-to-vehicle communications: readiness of V2V technology for application. Technical report (2014)Google Scholar
  13. 13.
    Hwang, J.Y., Lee, S., Chung, B.-H., Cho, H.S., Nyang, D.: Group signatures with controllable linkability for dynamic membership, vol. 222, pp. 761–778. Elsevier (2013)Google Scholar
  14. 14.
    Koscher, K., et al.: Experimental security analysis of a modern automobile. In: IEEE Symposium on Security and Privacy (SP), pp. 447–462. IEEE (2010)Google Scholar
  15. 15.
    Menezes, A.J., Okamoto, T., Vanstone, S.A.: Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans. Inf. Theor. 39(5), 1639–1646 (1993)MathSciNetCrossRefGoogle Scholar
  16. 16.
    Miller, C., Valasek, C.: A survey of remote automotive attack surfaces. Black Hat USA (2014)Google Scholar
  17. 17.
    Steger, M., Boano, C.A., Römer, K., Karner, M., Hillebrand, J., Rom, W.: Cesar: a testbed infrastructure to evaluate the efficiency of wireless automotive software updates. In: Proceedings of the 20th ACM International Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems, pp. 311–315. ACM (2017)Google Scholar
  18. 18.
    Steger, M., Dorri, A., Kanhere, S.S., Römer, K., Jurdak, R., Karner, M.: Secure wireless automotive software updates using blockchains: a proof of concept. In: Zachäus, C., Müller, B., Meyer, G. (eds.) Advanced Microsystems for Automotive Applications 2017. LNM, pp. 137–149. Springer, Cham (2018). Scholar
  19. 19.
    Sun, J., Zhang, C., Zhang, Y., Fang, Y.: An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Trans. Parallel Distrib. Syst. 21(9), 1227–1239 (2010)CrossRefGoogle Scholar
  20. 20.
    Unterluggauer, T., Wenger, E.: Efficient pairings and ECC for embedded systems. In: Batina, L., Robshaw, M. (eds.) CHES 2014. LNCS, vol. 8731, pp. 298–315. Springer, Heidelberg (2014). Scholar
  21. 21.
    Zhang, C., Lu, R., Lin, X., Ho, P.-H., Shen, X.: An efficient identity-based batch verification scheme for vehicular sensor networks. In: The 27th Conference on Computer Communications (INFOCOM 2008), pp. 246–250. IEEE (2008)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Tudor Andreica
    • 1
  • Bogdan Groza
    • 1
    Email author
  • Pal-Stefan Murvay
    • 1
  1. 1.Faculty of Automatics and ComputersPolitehnica University of TimisoaraTimişoaraRomania

Personalised recommendations