As of August 2020 the site you are on (wiki.newae.com) is deprecated, and content is now at rtfm.newae.com.

Changes

Jump to: navigation, search

Tutorial B7 Profiling Attacks (with HW Assumption)

165 bytes added, 14:48, 19 May 2016
Added note about non-working tutorial
Note that unlike the previous attack, we will require ''two'' acquisition campaigns. We must first create a template, which means we'll need a system which we control (or at least know the key for). In real life this would typically mean using another copy of the protected device; e.g. you have a protected device, but you buy another copy which you control. We use the copy we control to characterize the leakage, before applying what we have learned onto the real device with an unknown key.
 
''Note: in the bleeding-edge version of the CW-Analyzer software, this tutorial does not work - the auto-generated scripts do not work. Proceed at your own risk!''
== Setting up the Hardware and Software ==
Approved_users
510
edits

Navigation menu