Cyber Resilience: Foundation for Sustaining User Trust

As the technological capabilities of ADAS and AI-driven systems continue to mature, the barriers to mass adoption of autonomous vehicles are no longer primarily technical. Realworld applications, ranging from robotaxis and logistics delivery robots to autonomous truck fleet operations are already emerging through industry partnerships and evolving regulatory frameworks.

Increasingly, the primary barrier to autonomous vehicle adoption is shaped by user perception rather than technological readiness. Psychological and behavioral factors are beginning to influence demand, with public sentiment playing a critical role in determining adoption trajectories.  

Even a single incident or news of investigations by regulatory bodies can trigger widespread concern, resistance, and skepticism. These reactions reinforce the perception that autonomous systems should not operate on public roads, creating a mental barrier to full autonomy, and in turn, slowing investment and business development initiatives.  

Understanding this behavioral dimension is critical. The key question for mobility innovators now extends to whether users will continue to trust the system when something goes wrong. This shift calls for cyber resilience   the ability to maintain secure and reliable operations even under disruption   to serve as a foundation for sustaining user trust and enabling scalable adoption in a smart mobility ecosystem.  

Complexity of Modern Vehicle Systems  

Mobility is no longer a standalone product; it is evolving into an interconnected system of systems. The boundaries between mobility domains are increasingly blurred, with vehicles exhibiting robotic characteristics and distinctions between various modes of transportation gradually converging.  

As vehicle platforms evolve   from connected cars to software-defined vehicles, and ultimately AI-driven systems   their internal architecture has expanded significantly. What was once centered on hardware, electrical, electronic, and software components now extends to include on-demand applications, service-based functionalities, and AI-powered capabilities.  

Evolution towards AI-Defined Vehicles (ADV)

While this evolution enables greater functionality, it also introduces increased system interdependencies and, consequently, higher levels of unpredictability. This transformation is not occurring in isolation, but driven by a self-reinforcing cycle. 

Standard Convergence Flywheel

  • Standard Convergence: Common frameworks and regulations align across industries, enabling interoperability and shared development baselines.  
  • Technology Convergence: Shared architectures, platforms, software stacks are adopted across domains, accelerating cross-industry innovation.
  • Industry Interdependencies: Automotive, robotics, infrastructure and adjacent sectors become tightly interconnected, increasing system-level reliance.  
  • Economies of Scale: Wider adoption reduces costs and barriers, enabling faster deployment and reinforcing shared ecosystems.

This cycle continuously amplifies system connectivity and complexity, ultimately resulting in tightly coupled environments where disruptions are difficult to isolate and contain. They must be designed to function reliably within uncertain and dynamic environments. This requires not only protection against threats, but also the ability to maintain predictable behavior, ensure operational continuity under disruption, and support consistent system performance. 

In response to this shift, cyber resilience gains strategic importance. Cyber resilience refers to the ability of a system to withstand, recover from, and continue operating despite cyberattacks. It is no longer an enhancement, but a core requirement for ensuring that complex, interconnected systems remain stable, predictable and operable in real-world environments.  

Enhancing User Trust through Cyber Resilience  

While cyber resilience defines how systems operate under failure, its ultimate impact is measured in user trust. Research from University of New South Wales (Link) highlights that trust in autonomous vehicles is highly sensitive to cyber incidents, where even a single attack can undermine public confidence at scale. The study further emphasizes that trust is shaped by how effectively organizations prepare for and respond to such events in ways that align with user expectations.  

In this context, cybersecurity maturity becomes a critical determinant of adoption. Organizations that fail to demonstrate adequate preparedness risk eroding public confidence, which can slow adoption, reduce usage, and ultimately hinder the broader development of the autonomous mobility ecosystem.  

Recognizing the relationship between user trust and long-term business viability, systems must incorporate safeguards that reinforce user confidence. This includes enabling predictable behavior, supporting controlled responses and maintaining stable operation throughout the system lifecycle. As complexity increases across interconnected environments, trust evolves into a system-level requirement, extending beyond individual products to vehicles, services and networks.  

Enabling this shift requires more than optimizing individual technologies; it demands an integrated infrastructure approach that operates seamlessly across system boundaries   an approach that AUTOCRYPT is actively advancing. Through CRA-aligned regulatory readiness, in-vehicle cybersecurity solutions, and V2X security services, AUTOCRYPT supports OEMs and Tier 1 suppliers in building cyber-resilient systems, representing a natural evolution beyond traditional cybersecurity.  

Additional Resources

How EURO 7 Reinforces WP.29 Cybersecurity Compliance

UN R155 is widely regarded as a critical compliance milestone for OEMs and Tier suppliers under the UNECE WP.29 framework. Without a certified Cybersecurity Management System (CSMS), vehicles cannot obtain type approval in contracting markets, making compliance essential for market access. By contrast, comparatively less attention has been given to the EURO 7 standards EU’s latest vehicle emissions and durability regulatory framework set to begin application from November 2026. 

The EURO 7 standards, embedded within Regulation (EU) 2024/1257 (Link) is commonly viewed as an environmental regulation introducing new pollutant limits, battery performance thresholds, anti-tampering provisions and lifecycle monitoring requirements under the EU type-approval framework. However, its significance extends beyond conventional emissions compliance and should be understood within an integrated regulatory architecture alongside UN R155.  

This blog post aims to clarify why EURO 7 does not operate independently of WP.29 cybersecurity requirements and why, in practice, it functions as a structural reinforcement of vehicle type-approval obligations. Understanding how EURO 7 strengthens the operational relevance of UN R155 is essential to safeguarding type approval within an increasingly interconnected regulatory environment.

I. Understanding EURO 7

Role of the EURO Series in the Automotive Industry

The EURO regulatory framework has historically played a defining role in shaping automotive engineering priorities across Europe. From its earliest iterations, its core objectives have centered on reducing harmful pollutants, protecting public health and air quality, and providing predictable compliance pathways for manufacturers operating within the European market.  

Evolution of the EURO Emissions Standards: From EURO 1 to EURO 7

From EURO 1 through EURO 6, each iteration progressively tightened emissions limits, expanded testing methodologies, and increased alignment with real-world driving conditions. However, despite these advancements, the underlying regulatory logic remained largely certification-based and event-driven. Vehicles were validated under defined laboratory and real-driving emissions (RDE) test conditions, and once type-approval was granted, they were presumed compliant unless defects emerged during operation. 

Transition from EURO 6 to EURO 7 

Up until EURO 6, the standards were designed to evaluate predominantly mechanical vehicle architectures, where emissions behavior was largely hardware-determined and relatively stable over time. The turning point came with the Dieselgate corporate scandal, in which automakers engaged in the large-scale, deliberate use of defeat devices to manipulate emissions testing outcomes. Although vehicles passed defined regulatory testing conditions, their emissions performance diverged under real-world driving conditions, exposing the vulnerability of a certification-centered regulatory model.  

This incident revealed a structural misalignment between regulatory design and vehicle behavior, where compliance was assessed in a static manner while modern emissions performance had become dynamic and increasingly software-driven.  

Transition from EURO 6 to EURO 7: Structural misalignment between emissions behavior and regulatory design

II. EURO 7 within the WP.29 Cybersecurity Architecture

How EURO 7 Reflects the Software-Defined Nature of Modern Vehicles  

EURO 7 redesigns the regulatory architecture to reflect the software-defined nature of modern vehicles, recognizing that emissions behavior can be influenced by software logic and data modifications occurring throughout the vehicle lifecycle.  

Through amendments to Regulation (EU) 2018/858 (Link) Article 84, EURO 7 explicitly incorporates anti-tampering provisions, security and cybersecurity measures, enhanced market surveillance enforcement and a strengthened penalty framework. Under Article 3 (45), tampering is broadly defined to include disabling or modifying engine control systems, battery systems, OBD/OBM/OBFCM systems, odometers, software and logical control elements, and related data pathways.

At its core, EURO 7 reflects a regulatory realization: emissions compliance is inseparable from software integrity. As emissions-critical systems become software-governed, regulatory compliance structurally intersects with the cybersecurity governance framework established under UN R155, which remains essential for vehicle type approval.  

Intersection of EURO 7 and WP.29 

The intersection between Euro 7 and the WP.29 cybersecurity framework becomes evident when examining how emissions compliance is structured in software-defined vehicles.  

UN R155 governs software integrity within the WP.29 framework, and EURO 7 mandates long-term emissions and battery durability performance that depends on software-controlled systems. 

Intersection of EURO 7 and UN R155

Together, these requirements establish a structural dependency in which sustained emissions compliance relies on effective cybersecurity governance.  

This dependency is not merely conceptual. It is reinforced through explicit references to UN R155 within EURO 7, particularly in relation to cybersecurity measures, security requirements, and Threat Analysis and Risk Assessment (TARA) obligations.  

  • Article 4(11)  
    • Requires manufacturers to ensure the secure transmission of emissions and battery durability data by applying cybersecurity measures in accordance with UN R155
  • Annex XIV 
    • Defines anti-tampering, security, and cybersecurity requirements 
    • Incorporates UN R155 definitions of attacks 
    • Requires vulnerability minimization based on best available knowledge 
    • Mandates TARA processes that reflect EURO 7 objectives 
    • Provides conformity declaration templates for type approval submission 

These provisions demonstrate that EURO 7 does not operate independently of the WP.29 cybersecurity architecture; rather it integrates cybersecurity governance directly into emissions-related compliance obligations.   

III. Need for Digital Regulatory Convergence

In a software-defined vehicle environment, emissions compliance depends on the integrity, resilience, and governance of digital systems. As vehicles evolve into configurable, updateable and connected platforms, the ability to demonstrate sustained compliance throughout the vehicle’s operational life becomes essential.

Manufacturers must therefore move beyond documentation-based certification toward engineering-based accountability. Emissions-critical systems must be cyber-resilient, monitoring data must be protected against manipulation and overall system architecture must be secure-by-design.  

Within this regulatory landscape, the convergence of EURO 7 and the WP.29 cybersecurity framework establishes the need for integrated digital regulatory governance — aligning cybersecurity governance, environmental engineering and type approval strategy within a unified compliance architecture.  

Integrated Digital Regulatory Governance: Environmental engineering, Cybersecurity governance, Type approval strategy

At AUTOCRYPT, we support OEMs and Tier suppliers in navigating this regulatory convergence. Through our WP.29 consulting services (Link), we support firms in establishing and optimizing UN R155 Cybersecurity Management Systems (CSMS), conducting AI-powered Threat Analysis and Risk Assessments (TARA), and integrating cybersecurity governance into emissions-critical system architectures under a holistic regulatory strategy.  

Our objective extends beyond securing type approval. We help manufacturers sustain compliance throughout the vehicle lifecycle within an evolving regulatory landscape.

Additional Resources

AI-Driven DevSecOps in Next-Generation Mobility

Vehicle architecture is rapidly evolving into software-defined platforms that are continuously updated via OTA, connected to cloud ecosystems, and increasingly powered by AI-driven functionality. Most critically, mobility infrastructure now evolves post-deployment, with trust boundaries shifting dynamically across in-vehicle networks, backend systems, and third-party integrations.  

To maintain security in these continuously evolving systems, automotive cybersecurity engineering has had to evolve. In response, the industry has progressed through three distinct stages: Cybersecurity Engineering, DevSecOps and AI-Defined DevSecOps. 

Evolution of Automotive Cybersecurity

Cybersecurity Engineering: Defining what must be protected and why  

The first stage begins with Cybersecurity Engineering, which defines what components must be protected and why. Security is structured as engineers identify critical assets, define potential threats, assess risk levels, and design appropriate mitigations. This process transforms abstract security concerns into formalized risk models and enforceable security requirements.  

Cybersecurity Engineering spans the full vehicle ecosystem. Within the vehicle, it covers embedded systems such as ECUs and domain controllers, as well as in-vehicle communication networks including CAN and Automotive Ethernet. Across the software lifecycle, it governs secure boot, firmware integrity, and over-the-air (OTA) validation mechanisms to ensure software authenticity. Beyond the vehicle boundary, it addresses V2X authentication, vehicle-to-cloud APIs and secure backend communications.  

Core outputs include asset identification, threat modeling, Threat Analysis and Risk Assessment (TARA) and risk classification. These activities enable compliance with global standards such as UNECE R155 and ISO/SAE 21434, forming the backbone of Cybersecurity Management Systems (CSMS).  

Core Outputs of Cybersecurity Engineering

Industry implementations such as AutoCrypt CSTP (Cybersecurity Testing Platform) (Link) and TARA consulting services (Link) reflect the scope of this layer, combining regulatory alignment frameworks with technical validation practices that strengthen risk modeling across OEM and supplier environments.

Cybersecurity Engineering defined what required protection, but it did not ensure that protection would keep pace with change. Risk models were built on the assumption of relative architectural stability, and validation occurred at scheduled intervals. As vehicles became continuously updateable and trust boundaries shifted dynamically, periodic enforcement was no longer sufficient. Security logic had to move beyond definition, marking the transition to DevSecOps(Development, Security, and Operations). 

DevSecOps: Ensuring Security is Continuously Enforced  

As vehicle architectures evolved beyond static release cycles and periodic validation, security controls had to be embedded directly within development and deployment workflows.  

DevSecOps — a software engineering framework that integrates security into development and operational processes — emerged to address this requirement. Rather than treating security as a downstream validation step, DevSecOps embeds automated security controls into CI/CD pipelines to ensure continuous enforcement throughout the vehicle software lifecycle.  

Security testing became integrated into automated build processes, resulting in faster validation cycles and improved audit readiness. Secure build templates reduced configuration errors, firmware signing workflows were automated, and key provisioning systems became embedded into production processes. Defined security requirements became programmatically enforced, ensuring traceability at scale.

AUTOCRYPT’s launch of Automotive-CIS (Cybersecurity Infrastructure Standard) (Link) supports this stage by providing a unified framework for lifecycle governance through the integration of CSMS, SUMS, vSOC and TARA. This enables security activities to remain aligned across development, production and operational phases, strengthening end-to-end lifecycle consistency.   

Launch of Automotive-CIS (Cybersecurity Infrastructure Standard)

While Stage 2 marked a significant evolution in continuous enforcement, it retained a critical assumption: that the underlying risk model remained valid. DevSecOps enforces predefined controls, but it does not inherently detect when architectural changes invalidate original risk assumptions. In environments where OTA updates introduce new communication paths and AI models evolve post-deployment, risk landscapes shift dynamically. In such conditions, continuous enforcement must evolve into adaptive intelligence, paving the way for AI-Defined DevSecOps.  

AI-Defined DevSecOps: Adaptive Security Across the Lifecycle   

If Stage 1 defined security logic and Stage 2 automated its enforcement, Stage 3 introduces intelligence into the lifecycle.  

AI-Defined DevSecOps addresses the core limitation of rule-based automation by continuously assessing system state, detecting architectural change, and validating whether existing risk assumptions remain relevant. Rather than simply enforcing predefined controls, this stage enables adaptive orchestration, ensuring security mechanisms evolve alongside system behavior.   

At this stage, security becomes a closed-loop adaptive system. When an engineering change occurs, the system performs automated risk impact analysis, recalculates risk, triggers required revalidation and regenerates compliance evidence. In doing so, it ensures that the impact of changes is assessed in real time and that enforcement mechanisms remain synchronized with evolving architectures. 

Closed Loop Adaptive Security Model in AI-Defined DevSecOps

AUTOCRYPT’s advancements in AI-Defined DevSecOps, first introduced at CES 2026 (Link) including AI-powered TARA automation and automated test case generation within AutoCrypt CSTP — demonstrate this evolution in practice. By enhancing threat modeling completeness and deepening validation coverage within DevSecOps pipelines, these capabilities elevate security from automated enforcement to intelligent lifecycle orchestration.  

As mobility ecosystems are no longer fixated at design time, adaptive security becomes a structural necessity. In this environment, AI-Defined DevSecOps is not merely an enhancement, but a foundational layer for securing next-generation mobility systems.  

Evolutionary Stages of Automotive Cybersecurity Engineering  

Automotive cybersecurity engineering has evolved from structured risk definition to automated enforcement and now toward intelligent adaptation.  

As automotive systems become increasingly intelligent, the security layer must become equally intelligent. Adaptive security is foundational in next-generation mobility, where architectures shift dynamically and AI-driven functionality evolves over time.  

AUTOCRYPT is committed to proactively expanding AI-Defined DevSecOps across its portfolio, strengthening adaptive cybersecurity infrastructure as a core pillar of its research and development. Through this approach, we support OEMs and Tier 1 suppliers in maintaining continuous, resilient protection across rapidly evolving mobility ecosystems.  

To learn more about our end-to-end mobility solutions, visit https://autocrypt.io/ 

CES 2026 Highlights: From Key Management to AI-Driven Vehicle Security

At the 2026 Consumer Electronics Show (CES) in Las Vegas, AUTOCRYPT showcased its foundational and future-ready security solutions designed to secure every layer of mobility. Through the launch of its Automotive-CIS solution, AUTOCRYPT presented a globally integrated industry benchmark for end-to-end key management, while also introducing next-generation security approaches powered by AI technologies and post-quantum cryptography. Together, these initiatives articulated AUTOCRYPT’s vision for addressing both today’s cybersecurity challenges and the demands of the future mobility ecosystem.

[AUTOCRYPT] CES 2026 Themes

As the automotive industry accelerates towards the adoption of physical AI, robotics, and increasingly autonomous systems, regulatory requirements — such as the Cyber Resilience Act (CRA) (Link) — are expanding to cover all layers of connected mobility. In response, AUTOCRYPT aims to provide robust, scalable cybersecurity infrastructure that enables OEMs and Tier 1 suppliers to seamlessly embed security across this growing ecosystem.  

Foundational Mobility Infrastructure

Throughout the vehicle lifecycle, key management remains one of the most fundamental yet critical security components. However, today’s automotive supply chain relies on a wide range of cryptographic keys, each serving different purposes, using distinct algorithms, and managed by multiple entities. Against this backdrop, the need for a unified key and certificate management system has become increasingly apparent.  

On the first day of CES 2026, AUTOCRYPT introduced a standardized infrastructure designed to enable efficient deployment of key management systems across vehicles and adjacent industries, through the launch of “Automotive-CIS (Cybersecurity Infrastructure Standard) (Link).” 

[AUTOCRYPT] Solution Launch of Automotive-CIS (Cybersecurity Infrastructure Standard)

Designed to support the full vehicle lifecycle, from development and production to operation and inspection, the solution brings critical security functions into a single infrastructure framework. By unifying Cybersecurity Management System (CSMS), Software Update Management System (SUMS), Vehicle Security Operations Center (vSOC) and Threat Analysis and Risk Assessment (TARA), it provides a trusted foundation for continuous updates and lifecycle-based security enforcement.  

On the show floor, Automotive-CIS drew strong interest not only from automotive stakeholders, but also from players in agricultural manufacturing, construction and robotics. This reflects how software-defined systems are dissolving traditional industry boundaries and connecting digital ecosystems across domains.

Future-Ready Vehicle Solutions 

Across CES 2026, industry discussions emphasized the practical, measurable impact of next-generation technologies such as AI and quantum computing on operational efficiency and scalability. AUTOCRYPT showcased a deployable approach to applying AI in automotive cybersecurity, strengthening operational effectiveness and earning strong on-site recognition. The methodology demonstrated AI-driven automation across the DevSecOps process, including TARA and test-case generation within AutoCrypt CSTP (Link) streamlining the creation of audit-ready evidence. 

[AUTOCRYPT] AI-driven automation across the DevSecOps process

Preparing for Next-Gen Vehicle Security 

CES 2026 provided an opportunity not only to showcase solutions, but also to actively listen to public thoughts. AUTOCRYPT gathered public perspectives on software-defined vehicles (SDVs), cybersecurity concerns surrounding automated driving, and expectations for the future evolution of mobility through a thought wall prepared on-site. These insights serve as a valuable reference point as we look ahead to securing the next layer of automotive cybersecurity.  

[AUTOCRYPT] Public Perspectives on Future Mobility

  • The dominant perception of software-defined vehicles centered on the integration of vehicles and computation, enabling smarter, more adaptive mobility through autonomous and assisted driving capabilities.  
  • At the same time, participants clearly highlighted unresolved concerns — particularly around data governance, AI reliability, system behavior in edge cases and vulnerability to external cyber threats. These perspectives underscored a shared understanding that innovation must be accompanied by strong, trustworthy security foundations.  
  • Visitors also expressed optimism that future vehicles will become safer by design, combining intelligent software with robust engineering. More visionary ideas such as solar-powered mobility and aerial transportation illustrated how the public already views the boundaries of mobility expanding well beyond conventional road vehicles.   

Reflecting on these insights, AUTOCRYPT is committed to identifying emerging gaps in automotive cybersecurity and collaborating closely with open-source communities and industry associations. Through these efforts, AUTOCRYPT aims to help build resilient, interoperable security infrastructure that supports the safe and scalable advancement of AI-driven, software-defined mobility.   

To learn more about our end-to-end mobility solutions, visit https://autocrypt.io/all-products-and-offerings/.

AUTOCRYPT Unveils “Automotive-CIS,” a Global Integrated Cybersecurity Infrastructure Standard for Vehicles, at CES 2026

AUTOCRYPT, a leading automotive and AI cybersecurity solutions provider, announced at CES 2026 the launch of “Automotive-CIS (Cybersecurity Infrastructure Standard),” presenting a new global benchmark for vehicle cybersecurity infrastructure to the international technology community.

AUTOCRYPT Announces Launch of Automotive Cybersecurity Infrastructure Standard

Automotive-CIS is an advanced and expanded version of Autocrypt’s Software Security Infrastructure solution previously delivered to automotive manufacturers (OEMs). The new standard broadens its scope to include suppliers and establishes an integrated security architecture spanning the entire vehicle software lifecycle from development and production, all the way to driving and maintenance.

By integrating key functions like the Cybersecurity Management System (CSMS), Software Update Management System (SUMS), Vehicle Security Operations Center (vSOC), and Threat Analysis and Risk Assessment (TARA) into a single infrastructure standard, Automotive-CIS provides a core reference model for OEMs and suppliers as the industry shifts to software-defined vehicles (SDVs) and AI-driven mobility.

Autocrypt’s extensive proof-of-concept (PoC) projects with both domestic and international OEMs and suppliers have served as a foundation for the global vehicle cybersecurity standard, shown through inclusion of tailored deployment roadmaps, expert consulting, and comprehensive regulatory compliance strategies across the supply chain.

CEO and co-Founder, Seokwoo Lee remarked on the unveiling, “Automotive-CIS represents the essential foundations necessary for this new era of SDVs, AI mobility, and post-quantum computing.” He continued, “We are delighted to present this at CES 2026, as it provides OEMs and suppliers with an opportunity to collaboratively address evolving security challenges across the vehicle lifecycle.”

Autocrypt is currently showing its solutions at CES 2026, in Las Vegas from January 6-9. Visitors are welcome at the Las Vegas Convention Center, West Hall Booth #4667. Meetings are available on-site, by reservation only. Book a meeting at https://calendly.com/autocrypt_global/. To learn more, visit autocrypt.io 

 


About Autocrypt Co., Ltd. 

AUTOCRYPT is the leading player in automotive cybersecurity. It specializes in the development and integration of security software and solutions for in-vehicle systems, V2X communications, Plug&Charge, and fleet management, paving the way towards a secure and reliable C-ITS ecosystem in the age of software-defined vehicles. Its comprehensive suite of automotive cybersecurity testing services and platforms includes the award-winning AutoCrypt CSTP, which supports automotive OEMs and suppliers in meeting regulatory standards ilke ISO/SAE 21434, UNECE WP.29 UN R155, and CRA.

Post Quantum PKI for Next-Gen Vehicle Security

The automotive ecosystem is rapidly transitioning into a fully software-defined environment, with vehicles relying on complex software stacks and deeply interconnected systems. Features such as OTA updates, V2X communications, and digital keys enable unprecedented convenience and personalization – yet they also heighten dependence on secure connectivity infrastructure, particularly Public Key Infrastructure (PKI).  

As emerging technologies like quantum computing threaten to break the classical cryptographic foundations that secure software-defined vehicles (SDVs), reinforcing PKI has become essential to protecting next-generation mobility. In this blog, we explore how quantum computing introduces new risks to SDVs, why OEMs must strengthen the PKI trust layer in preparation for future threats, and how AUTOCRYPT is addressing this need through post-quantum solutions.  

Rising Threat of Quantum Computing to Automotive PKI

Software-defined vehicles rely heavily on cryptographic trust. Every interaction between the vehicle and its environment – whether OTA updates, V2X messages, or digital key exchanges – requires authentication and verification. PKI sits at the heart of this trust layer, ensuring that all messages, components and services the vehicle interacts with are legitimate.

Robust PKI Infrastructure for OTA Updates, V2X Communications, Digital Key Exchanges

The emerging problem is that sufficiently powerful quantum computers can break cryptographic algorithms such as RSA* and ECDSA**, which currently form the backbone of today’s automotive PKI.   

*RSA (Rivest–Shamir–Adleman): One of the most widely used public-key cryptographic algorithms 

**ECDSA (Elliptic Curve Digital Signature Algorithm): A lightweight digital signature algorithm used extensively in automotive systems 

In our previous blog post “Post-Quantum Cryptography, and the Future of Automotive Cybersecurity,” we addressed the growing necessity of PQC technology. Attackers are already employing Harvest Now, Decrypt Later (HNDL) tactics – capturing encrypted automotive data today with the intent to decrypt it once quantum capabilities mature. Given that vehicles remain in operation for 10-15 years, OEMs must proactively secure the trust layer before quantum risks materialize.  

The Essential Need for Transition to Post-Quantum PKI

The foundation of future-ready vehicle security begins with adopting post-quantum cryptography (PQC) algorithms designed to remain secure even against quantum-enabled attacks.  

Global standardization efforts reflect this urgency. Most notably, the National Institute of Standards and Technology (NIST) published FIPS 204 (Link) in August 2024, formally defining the Module-Lattice Digital Signature Algorithm (ML-DSA) as a U.S. federal PQC standard. With this milestone, ML-DSA became one of the first globally recognized digital signature baselines for national security and critical infrastructure systems.  

Unlike traditional IT systems which transition to PQC through software updates, the automotive domain faces structural challenges: 

  • ECU Compute Constraints: ECUs operate with limited memory, CPU capacity, and power. PQC algorithms are larger and require more computation, necessitating optimized implementations for embedded automotive hardware. 
  • Scalability Across Global Fleets: Modern vehicles depend on millions of certificates across ECUs, sensors, V2X modules, telematics units, and digital keys. Securing these at PQC scale demands a horizontally scalable PKI infrastructure capable of mass certificate issuance and rotation. 
  • Hybrid Coexistence: Automotive systems must support classical and post-quantum algorithms concurrently during a multi-year transition, ensuring compatibility without disrupting manufacturing or aftersales systems. 

These constraints make it essential for OEMs to have an automotive-grade, production-ready PKI ecosystem, capable of supporting PQC at scale.  

Evolving Solutions for the Post-Quantum Era  

Building on our long-standing expertise in automotive-grade PKI and cryptographic key management, AUTOCRYPT introduced AutoCrypt PKI-Vehicles, a next-generation solution designed to provide future-proof cryptographic resilience and establish a unified trust infrastructure across manufacturing, OTA, digital keys, and V2X.  

As one of the earliest commercial solutions enabling ML-DSA-based certificate issuance, AutoCrypt PKI Vehicles arrives at a pivotal moment — aligning with NIST standards and offering OEMs a timely response to emerging quantum-era security demands. The solution enables post-quantum vehicle key management, supporting ML-DSA based X.509 certificate issuance, PQC-enhanced digital key workflows, secure ECU onboarding and lifecycle authentication.  

AUTOCRYPT will showcase its future-proof solutions, including AutoCrypt PKI-Vehicles at the 2026 Consumer Electronic Show (CES) in Las Vegas from January 6-9. Meetings are available by reservation only. Book a meeting at https://calendly.com/autocrypt_global/.