As of August 2020 the site you are on (wiki.newae.com) is deprecated, and content is now at rtfm.newae.com. |
Difference between revisions of "AES-CCM Attack"
From ChipWhisperer Wiki
(→Performing Attack) |
|||
Line 8: | Line 8: | ||
=== Building Example === | === Building Example === | ||
+ | |||
+ | === Collecting Traces === | ||
+ | |||
+ | === Step #1: AES-CBC MAC Block #1 === | ||
+ | |||
+ | === Step #2: AES-CBC MAC Block #2 === | ||
+ | |||
+ | === Step #3: Recovery of AES-CTR Nonce === | ||
+ | |||
+ | === Step #4: Recovery of AES-CBC I.V. === | ||
+ | |||
+ | === Step #5: AES-CTR Pad === |
Revision as of 07:01, 1 November 2016
The following is an overview of the AES-CMM attack done by Eyal Ronen, detailed in his paper TODO ADD LINK. If using this attack please do not cite this page, instead cite the original research paper.