Abstract:To evaluate an ultra-lightweight blockcipher Piccolo’s ability to counteract Power Analysis Attack (PAA), an attack model, which focuses on the first round of Piccolo, was proposed and Correlation Power Analysis (CPA) was conducted on this cipher based on a power simulation acquisition platform. Due to the whiten keys and round permutation for the first round of Piccolo, attacking keys including RK0L, RK0R, WK0 and WK1 were divided into six sub-keys, which were disclosed one by one. This approach can reduce the 80-bit primary key search space from 280 to (2×220+2×24+2×28+216) and make it possible to recover the primary key. The attack results show that 500 power traces are enough to recover Piccolo’s 80-bit primary key. It is concluded that the hardware implementation of Piccolo without any countermeasure is vulnerable to CPA and some countermeasures should be used. This work is the first known report about the security of Piccolo against PAA.