Abstract
Side-channel attacks are a real threat to many secure systems. In this paper, we consider two ciphers used in the automotive industry – AES and ChaCha20 and we evaluate their resistance against side-channel attacks. In particular, the focus is laid upon the main non-linear component in these ciphers. Owing to the design of ChaCha20, it offers natural timing side-channel resistance and thus is suitable for affected applications. However, attacks exploiting the power side-channel are somewhat more difficult on ChaCha20 as compared to AES, but the overhead to protect ChaCha20 against such attack is considerably higher.
Original language | English |
---|---|
Title of host publication | 2018 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS) |
Place of Publication | Piscataway, NJ |
Publisher | IEEE |
Pages | 552-555 |
Number of pages | 4 |
ISBN (Electronic) | 978-1-5386-8240-1 |
ISBN (Print) | 978-1-5386-8241-8 |
DOIs | |
Publication status | Published - 2018 |
Event | APCCAS 2018: IEEE Asia Pacific Conference on Circuits and Systems - Chengdu, China Duration: 26 Oct 2018 → 30 Oct 2018 |
Conference
Conference | APCCAS 2018 |
---|---|
Country/Territory | China |
City | Chengdu |
Period | 26/10/18 → 30/10/18 |
Keywords
- Side-Channel Attack
- Machine learning
- Cryptography
- Automotive