Abstract
Piccolo is an ultra-lightweight encryption algorithm designed for highly resource-constrained platforms. However, lightweight algorithms are susceptible and vulnerable to side-channel attacks, including the powerful correlation power analysis (CPA) technique. This study highlights the vulnerability of Piccolo to CPA and propose an effective masking scheme to mitigate this threat. The conducted experiments demonstrate that CPA attack on unmasked implementations of Piccolo was successful, while the masked version of the algorithm proved resistant, preventing key recovery. Additionally, we have introduced a straightforward Boolean scheme for implementing the algorithm. These findings hold significant importance for the future of IoT devices and applications, where area, energy consumption, and security are critical considerations.
Similar content being viewed by others
References
Information-Technology Promotion Agency (IPA) Japan. "10 Major Security Threats 2020." IT Security Center (ISEC), Information-Technology Promotion Agency (IPA), Japan. (July 2020). https://www.ipa.go.jp/files/000084114.pdf. Accessed on 21 June2023
Cheng L, Zhao Y, Yang J, Liu L (2021) A countermeasure of power attack for lightweight cryptographic algorithm using bit permutation operation. J Phys Conf Ser 1856:012054
Patranabis S, Roy DB, Chakraborty A et al (2019) Lightweight design-for-security strategies for combined countermeasures against side channel and fault analysis in IoT applications. J Hardw Syst Secur 3:103–131. https://doi.org/10.1007/s41635-018-0049-y
Shibutani K, Isobe T, Hiwatari H, Mitsuda A, Akishita T, Shirai T. Piccolo (2011) Piccolo: an ultra-lightweight block cipher. In Cryptographic Hardware and Embedded Systems. CHES 342-357 Springer
Wang C, Xie X, Yu M, Wang J, Tang X (2012) A CPA attack against round based Piccolo-80 hardware implementation”, in 2012 5th International Congress on Image and Signal Processing 1735-1740 Chongqing, China
Biryukov A, Dinu D, Großschädl J (2016) Correlation power analysis of lightweight block ciphers: from theory to practice. In Applied Cryptography and Network Security: 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings 14, 537-557. Springer International Publishing
Masoumi M (2019) A highly efficient and secure hardware implementation of the advanced encryption standard. J Inf Sec App 48:102371. ISSN 2214-2126. https://doi.org/10.1016/j.jisa.2019.102371
Masoumi M, Habibi P, Jadidi M (2015) Efficient implementation of masked AES on Side-Channel Attack Standard Evaluation Board. 2015 International Conference on Information Society (i-Society). London, UK 151-156. https://doi.org/10.1109/i-Society.2015.7366878
Lidl R, Niederreiter H (1994) Introduction to finite fields and their applications. Cambridge University Press, second ed. Cambridge Books Online
Yang X, Adeyemo A, Bala A (2019) Abusaleh Jabir, “Novel techniques for memristive multifunction logic design. Integration 65:219–230
Ding AA, Chen C, Eisenbarth T (2016) Simpler, faster, and more robust t-test based leakage detection. COSADE, LNCS 9689:163–83
Mishra S, Mishra Z, Acharya B, “Hardware implementation of Piccolo Encryption Algorithm for constrained RFID application”, (2019) 9th Annual Information Technology. Electromechanical Engineering and Microelectronics Conference (IEMECON) 2019:85–89. https://doi.org/10.1109/IEMECONX.2019.8877071
Ramu G, Mishra Z, Singh P, Acharya B (2020) Performance optimized architectures of Piccolo block cipher for low resource IoT applications. International Journal of High Performance Systems Architecture 9(1):49–57
Kolia J, Chithra S, Ramasubramanian N (2021) Side-channel analysis using deep learning on hardware trojans. 2021 IOP Conf Ser Mater Sci Eng 1049:012018
Ge J, Xu Y, Liu R et al (2018) Power attack and protected implementation on lightweight block cipher SKINNY, 13th Asia Joint Conference on Information Security (Asia JCIS 2018). Beijing 69–74
Ma X, Zhang F, Han Y (2022) Authenticated encryption chip implementation against side-channel attack. J Phys Conf Ser 2221:012047
Levi I, Bellizia D, Bol D, Standaert F-X (2020) Ask less, get more: side-channel signal hiding, revisited. IEEE Transactions on Circuits and Systems I: Regular Papers 67(12):4904–4917. https://doi.org/10.1109/TCSI.2020.3005338
Diehl W, Abdulgadir A, Kaps JP, Gaj K (2017) Comparing the cost of protecting selected lightweight block ciphers against differential power analysis in low-cost FPGAs. 2017 International Conference on Field Programmable Technology (ICFPT), Melbourne, VIC, Australia 128-135. https://doi.org/10.1109/FPT.2017.8280130
Pundir N, Park J, Farahmandi F, Tehranipoor M (2022) Power side-channel leakage assessment framework at register-transfer level. In IEEE Transactions on Very Large Scale Integration (VLSI) Systems 30(9):1207-1218. https://doi.org/10.1109/TVLSI.2022.3175067
Sadhukhan R, Patranabis S, Ghoshal A et al (2017) An evaluation of lightweight block ciphers for resource-constrained applications: area, performance, and security. J Hardware System Security 1:203–218. https://doi.org/10.1007/s41635-017-0021-2
Diehl W, Abdulgadir A, Farahmand F, Kaps J-P, Gaj K (2018) Comparison of cost of protection against differential power analysis of selected authenticated ciphers. IEEE Int Symp Hardw Orient Secur Trust (HOST). Washington, DC, USA 147–152. https://doi.org/10.1109/HST.2018.8383904
Acknowledgements
The author acknowledges the anonymous reviewers for their valuable feedback and insightful comments.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Ethical Approval
Not applicable.
Competing Interests
The authors declare no competing interests.
Author Contributions
Not applicable.
Availability of Data and Material
The raw data that support the findings of this study are available from the corresponding author, upon reasonable request.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Masoumi, M. Design and Evaluation of a Power Analysis Resilient Implementation of Piccolo-80 Lightweight Encryption Algorithm. J Hardw Syst Secur 7, 101–109 (2023). https://doi.org/10.1007/s41635-023-00136-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41635-023-00136-0