On comparing side-channel properties of AES and ChaCha20 on microcontrollers

Side-channel attacks are a real threat to many secure systems. In this paper, we consider two ciphers used in the automotive industry - AES and ChaCha20 and we evaluate their resistance against side-channel attacks. In particular, the focus is laid upon the main non-linear component in these ciphers...

全面介紹

Saved in:
書目詳細資料
Main Authors: Najm, Zakaria, Jap, Dirmanto, Jungk, Bernhard, Picek, Stjepan, Bhasin, Shivam
其他作者: 2018 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS)
格式: Conference or Workshop Item
語言:English
出版: 2019
主題:
在線閱讀:https://hdl.handle.net/10356/104628
http://hdl.handle.net/10220/49349
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
機構: Nanyang Technological University
語言: English
實物特徵
總結:Side-channel attacks are a real threat to many secure systems. In this paper, we consider two ciphers used in the automotive industry - AES and ChaCha20 and we evaluate their resistance against side-channel attacks. In particular, the focus is laid upon the main non-linear component in these ciphers. Owing to the design of ChaCha20, it offers natural timing side-channel resistance and thus is suitable for affected applications. However, attacks exploiting the power side-channel are somewhat more difficult on ChaCha20 as compared to AES, but the overhead to protect ChaCha20 against such attack is considerably higher.