Paper 2020/267
Differential Power Analysis of the Picnic Signature Scheme
Tim Gellersen and Okan Seker and Thomas Eisenbarth
Abstract
Post-quantum cryptography introduces cryptographic algorithms that are secure against adversaries who can employ a quantum computer and it is the inevitable next-step in the evolution of the cryptographic algorithms. In order to create a conventional foundation the National Institute of Standards and Technology (NIST) started a competition for Post-Quantum Cryptography in 2017. This paper introduces the first differential side channel analysis of a candidate in the competition; the Picnic Signature Scheme. We present a successful side channel analysis of the underlying Multiparty LowMc implementation and show how leakages can be exploited to recover the entire secret key using two different parts of the algorithm. LowMc key recovery then allows to forge signatures for the calling Picnic post-quantum signature scheme. We target the NIST reference implementation executed on a FRDM-K66F development board. Key recovery succeeds with less than 1000 traces, which can be obtained from less than 30 observed Picnic signatures.
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Preprint. MINOR revision.
- Keywords
- Picnic Signature SchemeLowMcMultiparty ComputationPower AnalysisDPA
- Contact author(s)
-
tim gellersen @ student uni-luebeck de
okan seker @ uni-luebeck de
thomas eisenbarth @ uni-luebeck de - History
- 2021-05-18: revised
- 2020-03-04: received
- See all versions
- Short URL
- https://ia.cr/2020/267
- License
-
CC BY