[[File:challenges.png|border|800x800px]]
You can use the Traces, Source Code, and ".hex file" to help you in breaking the challenge. The following describes the format of the trace files, which you can use with your power-analysis attacks.
==== Trace File Format ====
==== Example CPA Attack ====
The default challenge will fall to a straight-forward CPA attack. You must determine what secret key was used during the encryption operation.
=== Submitting a Challenge ===