On Comparing Side-channel Properties of AES and ChaCha20 on Microcontrollers

Zakaria Najm, Dirmanto Jap, Bernhard Jungk, Stjepan Picek, Shivam Bhasin

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

2 Citations (Scopus)

Abstract

Side-channel attacks are a real threat to many secure systems. In this paper, we consider two ciphers used in the automotive industry – AES and ChaCha20 and we evaluate their resistance against side-channel attacks. In particular, the focus is laid upon the main non-linear component in these ciphers. Owing to the design of ChaCha20, it offers natural timing side-channel resistance and thus is suitable for affected applications. However, attacks exploiting the power side-channel are somewhat more difficult on ChaCha20 as compared to AES, but the overhead to protect ChaCha20 against such attack is considerably higher.
Original languageEnglish
Title of host publication2018 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS)
Place of PublicationPiscataway, NJ
PublisherIEEE
Pages552-555
Number of pages4
ISBN (Electronic)978-1-5386-8240-1
ISBN (Print)978-1-5386-8241-8
DOIs
Publication statusPublished - 2018
EventAPCCAS 2018: IEEE Asia Pacific Conference on Circuits and Systems - Chengdu, China
Duration: 26 Oct 201830 Oct 2018

Conference

ConferenceAPCCAS 2018
CountryChina
CityChengdu
Period26/10/1830/10/18

Keywords

  • Side-Channel Attack
  • Machine learning
  • Cryptography
  • Automotive

Fingerprint

Dive into the research topics of 'On Comparing Side-channel Properties of AES and ChaCha20 on Microcontrollers'. Together they form a unique fingerprint.

Cite this