As of August 2020 the site you are on (wiki.newae.com) is deprecated, and content is now at rtfm.newae.com.

Changes

Jump to: navigation, search

Tutorial A5 Breaking AES-256 Bootloader

8 bytes removed, 04:21, 4 August 2018
Update code for new SAD API
##: <pre>from chipwhisperer.analyzer.attacks.models.AES128_8bit import AES128_8bit, SBox_output</pre>
##: and change that line to:
##: <pre>from chipwhisperer.analyzer.attacks.models.AES128_8bit import AES128_8bit, InvBox_outputInvSBox_output</pre>
## and then also change this further down where we set the leakage model:
##: <pre>leak_model = AES128_8bit(InvSBox_output)</pre>
resync_traces.enabled = True
resync_traces.ref_trace = 0
resync_traces.ref_points target_window = (9100, 9300)resync_traces.input_window max_shift = (8900, 9500)200
attack = CPA()
Approved_users
510
edits

Navigation menu