Skip to main content
Log in

Design and Evaluation of a Power Analysis Resilient Implementation of Piccolo-80 Lightweight Encryption Algorithm

  • Published:
Journal of Hardware and Systems Security Aims and scope Submit manuscript

Abstract

Piccolo is an ultra-lightweight encryption algorithm designed for highly resource-constrained platforms. However, lightweight algorithms are susceptible and vulnerable to side-channel attacks, including the powerful correlation power analysis (CPA) technique. This study highlights the vulnerability of Piccolo to CPA and propose an effective masking scheme to mitigate this threat. The conducted experiments demonstrate that CPA attack on unmasked implementations of Piccolo was successful, while the masked version of the algorithm proved resistant, preventing key recovery. Additionally, we have introduced a straightforward Boolean scheme for implementing the algorithm. These findings hold significant importance for the future of IoT devices and applications, where area, energy consumption, and security are critical considerations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Information-Technology Promotion Agency (IPA) Japan. "10 Major Security Threats 2020." IT Security Center (ISEC), Information-Technology Promotion Agency (IPA), Japan. (July 2020). https://www.ipa.go.jp/files/000084114.pdf. Accessed on 21 June2023

  2. Cheng L, Zhao Y, Yang J, Liu L (2021) A countermeasure of power attack for lightweight cryptographic algorithm using bit permutation operation. J Phys Conf Ser 1856:012054

  3. Patranabis S, Roy DB, Chakraborty A et al (2019) Lightweight design-for-security strategies for combined countermeasures against side channel and fault analysis in IoT applications. J Hardw Syst Secur 3:103–131. https://doi.org/10.1007/s41635-018-0049-y

    Article  Google Scholar 

  4. Shibutani K, Isobe T, Hiwatari H, Mitsuda A, Akishita T, Shirai T. Piccolo (2011) Piccolo: an ultra-lightweight block cipher. In Cryptographic Hardware and Embedded Systems. CHES 342-357 Springer

  5. Wang C, Xie X, Yu M, Wang J, Tang X (2012) A CPA attack against round based Piccolo-80 hardware implementation”, in 2012 5th International Congress on Image and Signal Processing 1735-1740 Chongqing, China

  6. Biryukov A, Dinu D, Großschädl J (2016) Correlation power analysis of lightweight block ciphers: from theory to practice. In Applied Cryptography and Network Security: 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings 14, 537-557. Springer International Publishing

  7. Masoumi M (2019) A highly efficient and secure hardware implementation of the advanced encryption standard. J Inf Sec App 48:102371. ISSN 2214-2126. https://doi.org/10.1016/j.jisa.2019.102371

  8. Masoumi M, Habibi P, Jadidi M (2015) Efficient implementation of masked AES on Side-Channel Attack Standard Evaluation Board. 2015 International Conference on Information Society (i-Society). London, UK 151-156. https://doi.org/10.1109/i-Society.2015.7366878

  9. Lidl R, Niederreiter H (1994) Introduction to finite fields and their applications. Cambridge University Press, second ed. Cambridge Books Online

  10. Yang X, Adeyemo A, Bala A (2019) Abusaleh Jabir, “Novel techniques for memristive multifunction logic design. Integration 65:219–230

    Article  Google Scholar 

  11. Ding AA, Chen C, Eisenbarth T (2016) Simpler, faster, and more robust t-test based leakage detection. COSADE, LNCS 9689:163–83

    Google Scholar 

  12. Mishra S, Mishra Z, Acharya B, “Hardware implementation of Piccolo Encryption Algorithm for constrained RFID application”, (2019) 9th Annual Information Technology. Electromechanical Engineering and Microelectronics Conference (IEMECON) 2019:85–89. https://doi.org/10.1109/IEMECONX.2019.8877071

    Article  Google Scholar 

  13. Ramu G, Mishra Z, Singh P, Acharya B (2020) Performance optimized architectures of Piccolo block cipher for low resource IoT applications. International Journal of High Performance Systems Architecture 9(1):49–57

    Article  Google Scholar 

  14. Kolia J, Chithra S, Ramasubramanian N (2021) Side-channel analysis using deep learning on hardware trojans. 2021 IOP Conf Ser Mater Sci Eng 1049:012018

  15. Ge J, Xu Y, Liu R et al (2018) Power attack and protected implementation on lightweight block cipher SKINNY, 13th Asia Joint Conference on Information Security (Asia JCIS 2018). Beijing 69–74

  16. Ma X, Zhang F, Han Y (2022) Authenticated encryption chip implementation against side-channel attack. J Phys Conf Ser 2221:012047

  17. Levi I, Bellizia D, Bol D, Standaert F-X (2020) Ask less, get more: side-channel signal hiding, revisited. IEEE Transactions on Circuits and Systems I: Regular Papers 67(12):4904–4917. https://doi.org/10.1109/TCSI.2020.3005338

    Article  Google Scholar 

  18. Diehl W, Abdulgadir A, Kaps JP, Gaj K (2017) Comparing the cost of protecting selected lightweight block ciphers against differential power analysis in low-cost FPGAs. 2017 International Conference on Field Programmable Technology (ICFPT), Melbourne, VIC, Australia 128-135. https://doi.org/10.1109/FPT.2017.8280130

  19. Pundir N, Park J, Farahmandi F, Tehranipoor M (2022) Power side-channel leakage assessment framework at register-transfer level. In IEEE Transactions on Very Large Scale Integration (VLSI) Systems 30(9):1207-1218. https://doi.org/10.1109/TVLSI.2022.3175067

  20. Sadhukhan R, Patranabis S, Ghoshal A et al (2017) An evaluation of lightweight block ciphers for resource-constrained applications: area, performance, and security. J Hardware System Security 1:203–218. https://doi.org/10.1007/s41635-017-0021-2

    Article  Google Scholar 

  21. Diehl W, Abdulgadir A, Farahmand F, Kaps J-P, Gaj K (2018) Comparison of cost of protection against differential power analysis of selected authenticated ciphers. IEEE Int Symp Hardw Orient Secur Trust (HOST). Washington, DC, USA 147–152. https://doi.org/10.1109/HST.2018.8383904

Download references

Acknowledgements

The author acknowledges the anonymous reviewers for their valuable feedback and insightful comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Masoumi.

Ethics declarations

Ethical Approval

Not applicable.

Competing Interests

The authors declare no competing interests.

Author Contributions

Not applicable.

Availability of Data and Material

The raw data that support the findings of this study are available from the corresponding author, upon reasonable request.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Masoumi, M. Design and Evaluation of a Power Analysis Resilient Implementation of Piccolo-80 Lightweight Encryption Algorithm. J Hardw Syst Secur 7, 101–109 (2023). https://doi.org/10.1007/s41635-023-00136-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41635-023-00136-0

Keywords

Navigation