Workshop Description
For V2X architects, automotive security engineers, and connected vehicle programme leads. Covers IEEE 1609.2 and ETSI ITS quantum vulnerabilities, V2X PKI trust chain exposure, BSM/CAM signing migration to ML-DSA, bandwidth and latency constraints, and hybrid transition strategies for deployed vehicle fleets.
Vehicle-to-everything (V2X) communication is one of the most safety-critical applications of public key cryptography in any industry. Every Basic Safety Message (BSM) and Cooperative Awareness Message (CAM) is signed with ECDSA P-256 under IEEE 1609.2. Vehicles verify dozens of these signatures per second to make real-time safety decisions: collision avoidance, emergency braking coordination, intersection management. Shor's algorithm would break ECDSA entirely, enabling an attacker to forge vehicle identities and inject false safety messages into the V2X network. The V2X PKI, from root CAs through pseudonym certificate authorities, is equally vulnerable. The migration challenge is uniquely constrained: post-quantum signatures (ML-DSA at 2,420 bytes) are roughly 38 times larger than ECDSA (64 bytes), creating bandwidth pressure on 802.11p and C-V2X channels. Verification must complete in under 1 millisecond to maintain 10 Hz BSM generation. And vehicles sold today will be on the road for 10 to 15 years, making cryptographic agility in deployed hardware a prerequisite for any migration that does not strand existing fleets.
What participants cover
- V2X cryptographic architecture: how IEEE 1609.2 and ETSI ITS use ECDSA, ECDH, and ECIES for message signing, encryption, and PKI trust chains
- Quantum threat to safety messages: why Shor's algorithm enables forged BSMs/CAMs, spoofed vehicle identities, and compromised misbehaviour detection
- V2X PKI exposure: root CA, enrolment authority, authorisation authority, and pseudonym certificate vulnerabilities across the complete trust hierarchy
- Performance constraints: ML-DSA signature size (2,420 bytes versus 64 bytes ECDSA), verification latency requirements, and 802.11p/C-V2X channel capacity limits
- PQC migration strategies: ML-DSA for message signing, hybrid ECDSA+ML-DSA for backward compatibility, and PKI transition planning for root and intermediate CAs
- Standards roadmap: IEEE 1609.2 revision activity, ETSI ITS security migration, and the 10 to 15 year vehicle lifecycle constraint on deployed fleet migration