In recent years, the complexity and connectivity of automotive electronic systems have been continually increasing, exposing vehicles to unprecedented risks of cyberattacks. Hackers can easily access sensitive vehicle information through network vulnerabilities and even control key functions of vehicles, posing serious threats to the safety of drivers and passengers. The fourth one of Calterah’s cybersecurity white paper series, "Calterah Asymmetric Cryptography Design", introduces the advanced encryption technology of asymmetric cryptosystems and Calterah's unique asymmetric cryptographic engine design. By using the pairing mechanism of public and private keys, it ensures that only authorized users can access sensitive information, thereby reducing the risk of data leakage and effectively safeguarding the security of data transmission.
In the era of digital information explosion, massive data transmissions happen every day. If no protective measures are applied, the data sent and received can be easily intercepted by hackers. If plaintext transmission is used for sensitive data, hackers can effortlessly read the contents once the data is intercepted. Therefore, it is crucial to apply cryptographic methods to data transmission.
Figure 1: Risks of Data Transmission Leakage
The asymmetric cryptosystem (also known as public-key cryptosystem) is an encryption technology that uses two keys: a public key and a private key. The former can be made public and used by anyone to encrypt messages, while the latter is kept secret by the user for decrypting messages encrypted with the corresponding public key or for creating digital signatures.
Figure 2 Asymmetric Cryptosystem
In a symmetric cryptosystem, security relies on the confidentiality of keys, which means if the keys are leaked, the encrypted information becomes insecure. In contrast, the advantage of asymmetric cryptosystems is that the public key can be open to public, and even if the public key is stolen, it cannot be used to decrypt messages, thus offering higher security.
Current implementation solutions of asymmetric cryptographic engines primarily include the Rivest-Shamir-Adleman (RSA) algorithm, which is based on the difficulty of solving large number factorization problems, and the Elliptic Curve Cryptography (ECC) system, which is based on elliptic curve discrete logarithm problems.
3 Asymmetric Cryptographic Algorithms
3.1 RSA Algorithm
Invented by Ronald L. Rivest, Adi Shamir, and Leonard Adleman in 1977, the RSA algorithm is based on a simple principle of number theory: while it is easy to multiply two prime numbers, it is considerably difficult to deduce the original prime numbers from their product.
The steps of RSA algorithm are as follows:
3.2 ECC Algorithm
Elliptic Curve Cryptography (ECC) is a public key cryptosystem initially proposed by Neal Koblitz and Victor Miller in 1985. ECC can achieve comparable or higher security with shorter keys, compared to RSA. ECC with a 160-bit key offers a security level equivalent to RSA with a 1024-bit key, while a 210-bit ECC key equals the security level of RSA with a 2046-bit key.
ECC boasts advantages including higher security, lower power consumption, and smaller storage space, making it widely applicable for identity authentication, fast encryption, digital signatures, etc. A plane curve represented by the Weierstrass equation is known as an elliptic curve, commonly denoted as E:
E=y2+a1xy+a3y=x3+a2x2+a4x+a6
In practical applications, the elliptic curve used in the ECC public key cryptosystem is a simplified form of the Weierstrass equation. Additionally, the discriminant of the simplified elliptic curve must not be zero, as shown in the following formula:
y2=x3+ax+b mod p (4a3+27b2≠0)
y2 = x3 + x + 1 | y2 = x3 - 1 |
![]() |
![]() |
Figure 3 Examples of Elliptic Curves
Mathematically, elliptic curves are continuous, which poses security threats if directly used for encryption. Therefore, ECC restricts the curve to a finite integer field, turning it into a discrete set of points (similar to grid coordinates). The total number of these discrete points is known as the "order" of the curve, which is a critical parameter for ensuring encryption security.
The core operation in ECC is point multiplication, which refers to the calculation in the Abelian group composed of points on the elliptic curves, accounting for about 90% of the total cryptographic computation time. Point multiplication can be divided into point addition and doubling operations, implemented through the underlying operation units of modular multiplication, modular addition, modular subtraction, modular inversion, and modular squaring.
Modular arithmetic in the Montgomery domain can efficiently enhance performance for modular multiplication and squaring operations. In the point operation layer of ECC, using the projective coordinate system avoids the time-consuming modular inversion. Thus, all modular arithmetic operates within the Montgomery domain, and all point operations are conducted in the projective coordinate system for improved operational efficiency of ECC.
4 Application of Asymmetric Cryptography in Automotive Cybersecurity
With the further development of information technology and the rise of automotive intelligence, ensuring automotive cybersecurity has become increasingly important. Since the asymmetric cryptographic algorithms have two keys, they are particularly suitable for identity authentication, data encryption, and digital signatures in distributed systems.
5 Calterah Asymmetric Cryptography Engine Design
Calterah radar SoC products implement asymmetric cryptography engines designed based on a microcode architecture, which uses instruction sequencer to support various asymmetric algorithms, including:
The microcode-based architecture design of Calterah cryptography engine significantly enhances scalability, allowing support for new asymmetric algorithms through microcode upgrades.
Figure 5 Calterah Asymmetric Cryptography Engine Design
By employing Calterah asymmetric cryptographic engine, vehicle radar cybersecurity is effectively enhanced, protecting user data and preventing potential cyber threats. In the future, Calterah will continue to deepen the application of asymmetric cryptosystems, driving the automotive industry towards a safer and smarter future.