Research on correlation power analysis attack against Piccolo
CSTR:
Author:
Affiliation:

(1. Microelectronics Center, Harbin Institute of Technology, 150001 Harbin, China;2. School of Information & Electrical Engineering, Harbin Institute of Technology, 264209 Weihai, Shandong, China)

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    To evaluate an ultra-lightweight blockcipher Piccolo’s ability to counteract Power Analysis Attack (PAA), an attack model, which focuses on the first round of Piccolo, was proposed and Correlation Power Analysis (CPA) was conducted on this cipher based on a power simulation acquisition platform. Due to the whiten keys and round permutation for the first round of Piccolo, attacking keys including RK0L, RK0R, WK0 and WK1 were divided into six sub-keys, which were disclosed one by one. This approach can reduce the 80-bit primary key search space from 280 to (2×220+2×24+2×28+216) and make it possible to recover the primary key. The attack results show that 500 power traces are enough to recover Piccolo’s 80-bit primary key. It is concluded that the hardware implementation of Piccolo without any countermeasure is vulnerable to CPA and some countermeasures should be used. This work is the first known report about the security of Piccolo against PAA.

    Reference
    Related
    Cited by
Get Citation
Related Videos

Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:
  • Revised:
  • Adopted:
  • Online: October 10,2013
  • Published:
Article QR Code