Workshop Description
A modern connected vehicle receives dozens of OTA software updates per year. Each update is signed with RSA or ECDSA keys, transmitted over TLS-protected channels, and verified by secure boot firmware on the target ECU. Every link in that chain depends on cryptographic primitives that Shor's algorithm will break. A vehicle shipping in 2026 will be on the road until at least 2041. That is 15 years of cryptographic exposure, and for most OEMs, the ECUs installed at the factory cannot be physically recalled for key replacement. The OTA infrastructure itself is the only mechanism for rotating cryptographic material across the fleet, which means the OTA infrastructure must be quantum-safe before the ECUs it serves can be migrated.
UNECE WP.29 R155 requires a cybersecurity management system as a condition of type approval. R156 governs software update management and introduces RXSWIN (Rx Software Identification Number) versioning that is directly affected by cryptographic algorithm changes. ISO/SAE 21434 Clause 9 places vulnerability management obligations on OEMs that extend to supply chain cryptographic risk. This workshop covers the OTA-specific attack surface (code signing, TLS, secure boot, V2X), walks through a facilitator-led threat modelling exercise on a reference OTA architecture, and delivers a phased migration roadmap that sequences PQC deployment by ECU criticality class (ASIL-D safety-critical first, infotainment last). Participants leave with a cryptographic dependency map of their OTA chain and vendor procurement language for tier-1 ECU suppliers.
What participants cover
- OTA cryptographic chain analysis: code signing keys, TLS certificates, secure boot, V2X credentials, and HSM key storage
- ML-DSA (CRYSTALS-Dilithium) for ECU firmware signing: signature sizes, verification latency on ARM Cortex-R and Cortex-M MCUs
- Hybrid TLS 1.3 with ML-KEM for OTA server authentication and update delivery encryption
- UNECE WP.29 R155/R156 type approval implications: cryptographic agility as a CSMS requirement and RXSWIN versioning impact
- ISO/SAE 21434 Clause 9 vulnerability management: quantum threat as a supply chain risk vector for tier-1 ECU suppliers
- 15-year vehicle lifetime constraints: key rotation without physical recall, flash memory limits on legacy ECUs, ASIL-D migration sequencing