Key Management Solution for Automotive Manufacturing released
Automotive cybersecurity and mobility solutions company AUTOCRYPT released a comprehensive key management solution dedicated to the automotive industry. “AutoCrypt KEY” enables OEMs and suppliers to efficiently manage all types of cryptographic keys used for the components of connected and electric vehicles.
Autocrypt [South Korea] is a leading player in automotive and smart mobility security technologies, paving the way for Cooperative Intelligent Transport Systems (C-ITS) and autonomous driving through a multi-layered, holistic approach. Through its security solutions Autocrypt ensures that security is prioritized and optimized before vehicles hit the road.
Establishing trust – maximising security
Modern vehicles function through communications, including internal communications between ECUs and application processors, and external connections with nearby vehicles, roadside infrastructure, mobile devices, and charging stations. To ensure that all transmitted data are safely encrypted and all connected components can be securely verified, the use of cryptographic keys is essential in establishing trust between vehicle hardware, users, and services.
Based on a robust key management system (KMS), AutoCrypt KEY provides all the key management features needed for automotive production. This includes symmetric key, asymmetric key, public key infrastructure (PKI), hardware security module (HSM) key storage, Quantum Random Number Generation (QRNG), encryption, certification, and digital signature. Beyond these features, Autocrypt assists OEMs and tier suppliers in establishing an integrated key management framework across the supply chain, maximizing security and efficiency.
“With more and more advanced systems and components, cybersecurity now begins even prior to the automotive assembly line, with more and more component makers utilizing cryptographic keys in the production process,” said Daniel ES Kim, CEO of Autocrypt. “AutoCrypt KEY guides OEMs and suppliers in establishing a secure and efficient key-based security architecture,” he added.