Cryptology ePrint Archive: Report 2020/267

Differential Power Analysis of the Picnic Signature Scheme

Tim Gellersen and Okan Seker and Thomas Eisenbarth

Abstract: Post-quantum cryptography introduces cryptographic algorithms that are secure against adversaries who can employ a quantum computer and it is the inevitable next-step in the evolution of the cryptographic algorithms. In order to create a conventional foundation the National Institute of Standards and Technology (NIST) started a competition for Post-Quantum Cryptography in 2017.

This paper introduces the first differential side channel analysis of a candidate in the competition; the Picnic Signature Scheme. We present a successful side channel analysis of the underlying Multiparty LowMc implementation and show how leakages can be exploited to recover the entire secret key using two different parts of the algorithm. LowMc key recovery then allows to forge signatures for the calling Picnic post-quantum signature scheme. We target the NIST reference implementation executed on a FRDM-K66F development board. Key recovery succeeds with less than 1000 traces, which can be obtained from less than 30 observed Picnic signatures.

Category / Keywords: implementation / Picnic Signature Scheme, LowMc, Multiparty Computation, Power Analysis, DPA

Date: received 27 Feb 2020

Contact author: tim gellersen at student uni-luebeck de, okan seker@uni-luebeck de, thomas eisenbarth@uni-luebeck de

Available format(s): PDF | BibTeX Citation

Version: 20200304:080709 (All versions of this report)

Short URL: ia.cr/2020/267


[ Cryptology ePrint archive ]