Please use this identifier to cite or link to this item:
|Title:||On comparing side-channel properties of AES and ChaCha20 on microcontrollers||Authors:||Najm, Zakaria
Engineering::Electrical and electronic engineering
|Issue Date:||2018||Source:||Najm, Z., Jap, D., Jungk, B., Picek, S., & Bhasin, S. (2018). On comparing side-channel properties of AES and ChaCha20 on microcontrollers. 2018 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS). doi:10.1109/APCCAS.2018.8605653||Abstract:||Side-channel attacks are a real threat to many secure systems. In this paper, we consider two ciphers used in the automotive industry - AES and ChaCha20 and we evaluate their resistance against side-channel attacks. In particular, the focus is laid upon the main non-linear component in these ciphers. Owing to the design of ChaCha20, it offers natural timing side-channel resistance and thus is suitable for affected applications. However, attacks exploiting the power side-channel are somewhat more difficult on ChaCha20 as compared to AES, but the overhead to protect ChaCha20 against such attack is considerably higher.||URI:||https://hdl.handle.net/10356/104628
|DOI:||https://dx.doi.org/10.1109/APCCAS.2018.8605653||Rights:||© 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/APCCAS.2018.8605653||Fulltext Permission:||open||Fulltext Availability:||With Fulltext|
|Appears in Collections:||TL Conference Papers|
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.