2021
DOI: 10.1109/ojcas.2021.3127273
|View full text |Cite
|
Sign up to set email alerts
|

ChaCha20-in-Memory for Side-Channel Resistance in IoT Edge-Node Devices

Abstract: IoT edge devices process the data collected, which can contain sensitive information related to the user. It is crucial to incorporate robust encryption algorithms considering the resource and power budget of these devices. In this paper, we present a power-based SCA-resistant implementation of the ChaCha20 encryption algorithm for low-end devices by utilizing memory arrays. The 10T SRAM-based implementation performs simple operations (like NAND, NOR, XOR) on the bitlines and other operations like addition/sub… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 20 publications
(17 reference statements)
0
5
0
Order By: Relevance
“…The ChaCha20 [154] stream cipher generates a legitimate, seemingly random stream of bits by combining the outcomes of three basic arithmetic operations: addition, rotation, and exclusive-or (XOR). To guarantee the authenticity of a communication, Poly1305 authenticators generate two tags, an authentication tag and a verification tag.…”
Section: Chacha20-poly1305mentioning
confidence: 99%
“…The ChaCha20 [154] stream cipher generates a legitimate, seemingly random stream of bits by combining the outcomes of three basic arithmetic operations: addition, rotation, and exclusive-or (XOR). To guarantee the authenticity of a communication, Poly1305 authenticators generate two tags, an authentication tag and a verification tag.…”
Section: Chacha20-poly1305mentioning
confidence: 99%
“…As depicted in the flow diagram in Fig. 3, it updates the words via additions, XORs, and rotations [15]. Furthermore, Chacha20 employs distinct operations within its column transformations, enabling it to do two updates per round, hence enhancing its computational efficiency.…”
Section: Chacha 20 Algorithmmentioning
confidence: 99%
“…Pages: [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19] Asymmetric cryptography uses two separate keys, whereas the symmetric cryptography algorithm uses a single key for both encryption and decryption. The cryptographic hash function accepts variable-length inputs and produces results with fixed-length outputs.…”
Section: Introductionmentioning
confidence: 99%
“…As such, some approaches have been explored to increase the bit rate of the AEAD implementation. For example, the in-memory implementations of ChaCha20 improve the bit rate and the security for side-channel attacks [12]. Finally, the hardware implementations provide a high bit rate compared to other implementations.…”
Section: Introductionmentioning
confidence: 99%