As of August 2020 the site you are on (wiki.newae.com) is deprecated, and content is now at rtfm.newae.com. |
Difference between revisions of "CHES2016 CTF"
(Created page with "[chesworkshop.org|CHES 2016] will have a brand new Capture The Flag (CTF) event, run by Colin O'Flynn. This event will challenge novice and advanced embedded security research...") |
|||
Line 6: | Line 6: | ||
1. AES-128 running on Atmel XMEGA, with power analysis. Key not stored in firmware (attack via DPA). | 1. AES-128 running on Atmel XMEGA, with power analysis. Key not stored in firmware (attack via DPA). | ||
+ | |||
2. AES-128 running on Linux computer, without power analysis. Key stored in firmware (White box). | 2. AES-128 running on Linux computer, without power analysis. Key stored in firmware (White box). | ||
Revision as of 06:35, 14 May 2016
[chesworkshop.org|CHES 2016] will have a brand new Capture The Flag (CTF) event, run by Colin O'Flynn. This event will challenge novice and advanced embedded security researchers alike, by providing a platform to exchange AES implementations with various countermeasures (including against power analysis, and against firmware analysis using white box crypto).
Attack Website
There are two types of cryptographic implementations available for your browsing pleasure. They are either:
1. AES-128 running on Atmel XMEGA, with power analysis. Key not stored in firmware (attack via DPA).
2. AES-128 running on Linux computer, without power analysis. Key stored in firmware (White box).
As a user, you can submit source-code to accomplish #1, which will run the code on an embedded hardware platform.