Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 4/2014

01-12-2014

Security analysis of block cipher Piccolo suitable for wireless sensor networks

Author: Kitae Jeong

Published in: Peer-to-Peer Networking and Applications | Issue 4/2014

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Piccolo is a 64-bit block cipher suitable for the constrained environments such as wireless sensor network environments. In this paper, we propose differential fault analysis on Piccolo. Based on a random byte fault model, our attack can recover the secret key of Piccolo-80 by using an exhaustive search of \(2^{24}\) and six random byte fault injections on average. It can be simulated on a general PC within a few seconds. In the case of Piccolo-128, we require an exhaustive search of \(2^{40}\) and eight random byte fault injections on average. This attack can be simulated on a general PC within 1 day. These results are the first known side-channel attack results on them.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Biham E, Shamir A (1997) Differential fault analysis of secret key cryptosystems. In: Crypto 1997, LNCS 1294. Springer, pp 513–525 Biham E, Shamir A (1997) Differential fault analysis of secret key cryptosystems. In: Crypto 1997, LNCS 1294. Springer, pp 513–525
2.
go back to reference Cannière C, Dunkelman O, Kneževuć M (2009) KATAN and KTANTAN - a family of small and efficient hardware-oriented block ciphers. In: CHES 2009, LNCS 5747. Springer, pp 272–288 Cannière C, Dunkelman O, Kneževuć M (2009) KATAN and KTANTAN - a family of small and efficient hardware-oriented block ciphers. In: CHES 2009, LNCS 5747. Springer, pp 272–288
3.
go back to reference Chen H, Wu W, Feng D (2007) Differential fault analysis on CLEFIA. In: ICICS 2007, LNCS 4861. Springer, pp 284–295 Chen H, Wu W, Feng D (2007) Differential fault analysis on CLEFIA. In: ICICS 2007, LNCS 4861. Springer, pp 284–295
4.
go back to reference Guo J, Peyrin T, Poschmann A, Robshaw M (2011) The LED block cipher. In: CHES 2011, LNCS 6917. Springer, pp 326–341 Guo J, Peyrin T, Poschmann A, Robshaw M (2011) The LED block cipher. In: CHES 2011, LNCS 6917. Springer, pp 326–341
5.
go back to reference Jeong K, Lee C (2012) Differential fault analysis on block cipher LED-64. Future information technology, application, and service. In: LNEE 164. Springer, pp 747–755 Jeong K, Lee C (2012) Differential fault analysis on block cipher LED-64. Future information technology, application, and service. In: LNEE 164. Springer, pp 747–755
6.
go back to reference Jeong K, Lee Y, Sung J, Hong S (2012) Differential fault analysis on block cipher SEED. Math Comput Model (Elsevier) 55(1–2):26–34CrossRefMATHMathSciNet Jeong K, Lee Y, Sung J, Hong S (2012) Differential fault analysis on block cipher SEED. Math Comput Model (Elsevier) 55(1–2):26–34CrossRefMATHMathSciNet
7.
go back to reference Knudsen L, Leander G, Poschmann A, Robshaw M (2010) PRINTcipher: a block cipher for IC-printing. In: CHES 2010, LNCS 6225. Springer, pp 16–32 Knudsen L, Leander G, Poschmann A, Robshaw M (2010) PRINTcipher: a block cipher for IC-printing. In: CHES 2010, LNCS 6225. Springer, pp 16–32
8.
go back to reference Li W, Gu D, Li J (2008) Differential fault analysis on the ARIA algorithm. Inf Sci 178(19):3727–3737CrossRef Li W, Gu D, Li J (2008) Differential fault analysis on the ARIA algorithm. Inf Sci 178(19):3727–3737CrossRef
9.
go back to reference Shibutani K, Isobe T, Hiwatari H, Mitsuda A, Akishita T, Shirai T (2011) Piccolo: an ultra-lightweight blockcipher. In: CHES 2011, LNCS 6917. Springer, pp 342–357 Shibutani K, Isobe T, Hiwatari H, Mitsuda A, Akishita T, Shirai T (2011) Piccolo: an ultra-lightweight blockcipher. In: CHES 2011, LNCS 6917. Springer, pp 342–357
10.
go back to reference Tunstall M, Mukhopadhyay D, Ali S (2011) Differential fault analysis of the advanced encryption standard using a single fault. In: WISTP 2011, LNCS 6633. Springer, pp 224–233 Tunstall M, Mukhopadhyay D, Ali S (2011) Differential fault analysis of the advanced encryption standard using a single fault. In: WISTP 2011, LNCS 6633. Springer, pp 224–233
11.
go back to reference Wang Y, Wu W, Yu X (2012) Biclique cryptanalysis of reduced-round piccolo block cipher. In: ISPEC 2012, LNCS 7232. Springer, pp 337–352 Wang Y, Wu W, Yu X (2012) Biclique cryptanalysis of reduced-round piccolo block cipher. In: ISPEC 2012, LNCS 7232. Springer, pp 337–352
Metadata
Title
Security analysis of block cipher Piccolo suitable for wireless sensor networks
Author
Kitae Jeong
Publication date
01-12-2014
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 4/2014
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-012-0196-9

Other articles of this Issue 4/2014

Peer-to-Peer Networking and Applications 4/2014 Go to the issue

Premium Partner