Accelerate the Promotion and Application of Commercial Cryptography Technology in The Automotive Industry

Authors

  • Yuning Li
  • Kaitian Li
  • Xuebin Shao

DOI:

https://doi.org/10.54097/1wt51486

Keywords:

Commercial cryptography; The automotive industry; Information security; Promotion and application; Safety protection.

Abstract

With the acceleration of the intelligent and networked process of the automobile industry, the problem of information security has become increasingly prominent. As the core guarantee means of information security, the promotion and application of commercial cryptography technology in the automobile industry is particularly important. In this paper, the application status and challenges of commercial cryptography technology in automobile industry are comprehensively analyzed, and the relevant strategies for promotion and application are put forward. By strengthening policy guidance, improving technological innovation capacity, promoting standardization construction and strengthening industry cooperation and exchanges, the aim is to accelerate the popularization and application of commercial cryptography technology in the automotive industry and improve the security protection capability of automotive information systems. The research of this paper is of great significance for promoting the construction of information security in automobile industry and promoting the rapid development of commercial cryptography technology.

Downloads

Download data is not yet available.

References

Li Fuqiang, Peng Haili. Application of dynamic encryption based on Private network in Automotive industry management [J]. Commercial Vehicles,2018,(12):105-107.

Wei Cheng. Car network identity authentication and privacy in the aggregation scheme research [D]. Huazhong university of science and technology, 2022. The DOI: 10.27157 /, dc nki. Ghzku. 2022.003530.

Wei Jumei, Zhang Liang, Ban Dingdong, et al. Based on new data security laws and regulations of automobile enterprise data security construction analysis [J]. Modern industrial economy and information technology, 2022, 12 (02) : 130-132. The DOI: 10.16525 / j.carol carroll nki. 14-1362 / n. 2022.02.049.

XinRui S ,MuXi L ,XueZhu Y , et al.Research on C-V2X short-range communication security authentication technology based on domestic commercial cryptography algorithm [C]//[Publisher unknown],2023:

Patsakis ,Constantinos,Solanas , et al.Privacy-Aware Event Data Recorders: Cryptography Meets the Automotive Industry Again [J]. IEEE Communications Magazine: Articles, News, and Events of Interest to Communications Engineers, 2013, 51(12): 122-128.

Measures for Management of security evaluation of commercial cryptography applications [J]. Bulletin of The State Council of the People's Republic of China,2023,(33):29-32.

Tian Minqiu. Review on research of cryptographic standard system in China [J]. Information Security and Communication Security,2018,(05):94-101.

Gai Wenxuan, Xu Yu, Jin Junjie. Research on Commercial Password Application for Cloud scenario [C]// China Network Security Industry Alliance. Proceedings of 2023 Network Security Outstanding Innovation Achievement Competition. Hangzhou Anheng Information Technology Co., LTD.; 4, 2023: DOI: 10.26914 / Arthur c. nkihy. 2023.049934.

Yao H Y, Chu R, Li H X, et al. Nuclear security system based on domestic commercial password solution study [J]. Automation instrument, 2023, 44 (S1) : 268-271 + 276. DOI: 10.16086 / j.carol carroll nki issn1000-0380.2023040038.

Yang Nian. Research on the construction of public service platform for commercial cryptography application [J]. Communications and Information Technology, 2023, (05):126-129.

GONG Qimin. Data encryption and standardization of data encryption technology [J]. Communications Security, 1987, (01): 1-12.

Downloads

Published

19-04-2024

Issue

Section

Articles

How to Cite

Li, Y., Li, K., & Shao, X. (2024). Accelerate the Promotion and Application of Commercial Cryptography Technology in The Automotive Industry. Frontiers in Business, Economics and Management, 14(3), 249-254. https://doi.org/10.54097/1wt51486