Review Article

Lightweight Cryptographic Techniques for Automotive Cybersecurity

Table 3

Symmetric ciphers for vehicular network with respect to security requirements and attack mitigation.

Cryptographic Ciphers Security Requirements support Attack Mitigation

Blowfish Authentication/AvailabilityDifferential related-key attacks/Brute-force attack
PBASAuthentication/Availability/ConfidentialityDoS attack, Impersonation attack
Camellia Authentication/Availability/Privacy PreservationImpersonation attack/DoS/Sybil attacks
CASTAuthentication/Availability/Confidentiality Sybil/Impersonation attack/routing attacks