Workshops Automotive OTA Update Security
Automotive Full Day Workshop

Quantum-Safe Over-the-Air Update Security for Connected Vehicles

Every connected vehicle on the road depends on OTA update infrastructure secured by RSA or ECC. This workshop covers how to migrate that infrastructure to post-quantum cryptography before the cryptographic assumptions underlying ECU firmware signing, server authentication, and update delivery are broken.

Full day (6 hours + Q&A)
In person or online
Max 30 delegates

Proud to recommend our expert members

Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IDQ
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IDQ
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside

Workshop Description

A modern connected vehicle receives dozens of OTA software updates per year. Each update is signed with RSA or ECDSA keys, transmitted over TLS-protected channels, and verified by secure boot firmware on the target ECU. Every link in that chain depends on cryptographic primitives that Shor's algorithm will break. A vehicle shipping in 2026 will be on the road until at least 2041. That is 15 years of cryptographic exposure, and for most OEMs, the ECUs installed at the factory cannot be physically recalled for key replacement. The OTA infrastructure itself is the only mechanism for rotating cryptographic material across the fleet, which means the OTA infrastructure must be quantum-safe before the ECUs it serves can be migrated.

UNECE WP.29 R155 requires a cybersecurity management system as a condition of type approval. R156 governs software update management and introduces RXSWIN (Rx Software Identification Number) versioning that is directly affected by cryptographic algorithm changes. ISO/SAE 21434 Clause 9 places vulnerability management obligations on OEMs that extend to supply chain cryptographic risk. This workshop covers the OTA-specific attack surface (code signing, TLS, secure boot, V2X), walks through a facilitator-led threat modelling exercise on a reference OTA architecture, and delivers a phased migration roadmap that sequences PQC deployment by ECU criticality class (ASIL-D safety-critical first, infotainment last). Participants leave with a cryptographic dependency map of their OTA chain and vendor procurement language for tier-1 ECU suppliers.

What participants cover

  • OTA cryptographic chain analysis: code signing keys, TLS certificates, secure boot, V2X credentials, and HSM key storage
  • ML-DSA (CRYSTALS-Dilithium) for ECU firmware signing: signature sizes, verification latency on ARM Cortex-R and Cortex-M MCUs
  • Hybrid TLS 1.3 with ML-KEM for OTA server authentication and update delivery encryption
  • UNECE WP.29 R155/R156 type approval implications: cryptographic agility as a CSMS requirement and RXSWIN versioning impact
  • ISO/SAE 21434 Clause 9 vulnerability management: quantum threat as a supply chain risk vector for tier-1 ECU suppliers
  • 15-year vehicle lifetime constraints: key rotation without physical recall, flash memory limits on legacy ECUs, ASIL-D migration sequencing

Preliminary Agenda

Full-day session structure with scheduled breaks. Content is configurable to your OTA architecture, ECU fleet composition, and type approval jurisdiction.

# Session Topics
1 OTA Attack Surface Under Quantum Threat Why vehicle update infrastructure is a high-value target
2 OTA Cryptographic Architecture Deep Dive ECU firmware signing, server authentication, and delivery encryption
  • RSA and ECC dependencies across the OTA chain: code signing keys, TLS certificates, secure boot, V2X
  • ECU firmware signing with ML-DSA (CRYSTALS-Dilithium): signature sizes, verification latency on automotive MCUs
  • OTA server authentication and update delivery: hybrid TLS 1.3 with ML-KEM key encapsulation
Break, after 60 min
3 Regulatory and Type Approval Compliance UNECE WP.29 R155/R156, ISO/SAE 21434, and TISAX
  • UNECE WP.29 R155 cybersecurity management system: cryptographic agility as a type approval condition
  • R156 software update management: how PQC migration affects RXSWIN versioning and homologation
  • ISO/SAE 21434 Clause 9 vulnerability management: quantum threat as a supply chain risk vector
4 Interactive Demonstration Facilitator-led OTA threat modelling exercise
  • Walk-through of a quantum-enabled OTA attack scenario: intercepted firmware update, forged code signature
  • Cryptographic dependency mapping for a reference OTA architecture (cloud, gateway ECU, target ECUs)
  • Migration priority sequencing by ECU class: safety-critical ASIL-D first, infotainment last
Break, after 90 min
5 Implementation Roadmap Phased PQC migration for OTA infrastructure
  • Phase 1 (immediate): hybrid TLS for OTA servers, ML-DSA dual-signing for new ECU firmware releases
  • Phase 2 (12-24 months): secure boot migration, HSM key provisioning for ML-KEM, gateway ECU updates
  • Vendor procurement language: cryptographic agility clauses for tier-1 ECU suppliers and TSPs
6 Vehicle Lifetime Constraints Managing 15-year cryptographic exposure windows
  • Vehicles shipping in 2026 will be on roads until 2041: what cryptographic assumptions hold across that window
  • Key rotation strategies for vehicles without physical recall capability
  • Balancing flash memory constraints on legacy ECUs against PQC key and signature sizes
7 Q&A and Action Planning

Designed and Delivered By

Workshops are designed and delivered by QSECDEF in collaboration with sector specialists. All facilitators have direct experience in both quantum technologies and automotive systems.

QD

Quantum Security Defence

Workshop design and delivery

QSECDEF brings world-leading expertise in post-quantum cryptography, quantum computing strategy, and defence-grade security assessment. Our advisory membership spans 600+ organisations and 1,200+ professionals working at the intersection of quantum technologies and critical infrastructure security.

AU

Automotive Sector Partners

Domain expertise and operational validation

Automotive workshops are co-delivered with sector specialists who bring direct operational experience in automotive organisations. This ensures workshop content is grounded in regulatory, operational, and technical realities specific to the sector.

Commission This Workshop

Sessions are configured around your OTA architecture, ECU fleet composition, and type approval jurisdiction. Get in touch to discuss requirements and schedule a date.

Contact Us