by nimishk on 4/14/25, 3:28 PM with 10 comments
by johnea on 4/14/25, 6:58 PM
The article does mention that he created the ChaCha20 algorithm, and that he first characterized the timing side channel attack, but his extremely small, simple and fast source libraries are publicly available.
They are fully self contained, no dependencies, and small enough to easily include in small-ish embedded systems:
Elliptic curve vulnerability to quantum computing is discussed here:
DISCLAIMER: I'm not a crypto expert, just an occasional user
DJB has been at the forefront of advancing crypto for decades, and has a very strong emphasis on simplicity and security. Any article on the subject really should reference his original source pages:
I've always been a fan of "the DJB way", which is a very simple method of initializing and managing unix type systems. The voidlinux distro roughly follows these principles today.
by api on 4/14/25, 5:50 PM
Security-wise they are roughly equivalent in practice if they are used properly.
by jmclnx on 4/14/25, 5:16 PM
rot13 is my limit of understanding :) But I do like reading these articles.
by DyslexicAtheist on 4/15/25, 6:31 AM
> We use ChaCha20 as the encryption stream cipher because it is faster than AES in software-only implementations, it is not sensitive to timing attacks and has undergone rigorous analysis ([3], [4] and [5]). We chose this over AES as future advances in cryptanalysis might uncover security issues with it, its performance on platforms that lack dedicated hardware is slow, and many AES implementations are vulnerable to cache-collision timing attacks [[6]].
by rainsford on 4/15/25, 1:19 AM