You are looking at a specific version 20200304:080709 of this paper. See the latest version.

Paper 2020/267

Differential Power Analysis of the Picnic Signature Scheme

Tim Gellersen and Okan Seker and Thomas Eisenbarth

Abstract

Post-quantum cryptography introduces cryptographic algorithms that are secure against adversaries who can employ a quantum computer and it is the inevitable next-step in the evolution of the cryptographic algorithms. In order to create a conventional foundation the National Institute of Standards and Technology (NIST) started a competition for Post-Quantum Cryptography in 2017. This paper introduces the first differential side channel analysis of a candidate in the competition; the Picnic Signature Scheme. We present a successful side channel analysis of the underlying Multiparty LowMc implementation and show how leakages can be exploited to recover the entire secret key using two different parts of the algorithm. LowMc key recovery then allows to forge signatures for the calling Picnic post-quantum signature scheme. We target the NIST reference implementation executed on a FRDM-K66F development board. Key recovery succeeds with less than 1000 traces, which can be obtained from less than 30 observed Picnic signatures.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint. MINOR revision.
Keywords
Picnic Signature SchemeLowMcMultiparty ComputationPower AnalysisDPA
Contact author(s)
tim gellersen @ student uni-luebeck de
okan seker @ uni-luebeck de
thomas eisenbarth @ uni-luebeck de
History
2021-05-18: revised
2020-03-04: received
See all versions
Short URL
https://ia.cr/2020/267
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.