Review Article
Lightweight Cryptographic Techniques for Automotive Cybersecurity
Table 3
Symmetric ciphers for vehicular network with respect to security requirements and attack mitigation.
| Cryptographic Ciphers | Security Requirements support | Attack Mitigation |
| Blowfish | Authentication/Availability | Differential related-key attacks/Brute-force attack | PBAS | Authentication/Availability/Confidentiality | DoS attack, Impersonation attack | Camellia | Authentication/Availability/Privacy Preservation | Impersonation attack/DoS/Sybil attacks | CAST | Authentication/Availability/Confidentiality | Sybil/Impersonation attack/routing attacks |
|
|