As of August 2020 the site you are on (wiki.newae.com) is deprecated, and content is now at rtfm.newae.com.

Difference between revisions of "Getting Started"

From ChipWhisperer Wiki
Jump to: navigation, search
(Added page)
 
(Change header levels)
 
(5 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 
Interested in side channel analysis? This page should help you get some ideas of where to start.
 
Interested in side channel analysis? This page should help you get some ideas of where to start.
  
= Hardware =
+
== Hardware ==
ChipWhisperer is maintained by NewAE Technology Inc. The ChipWhisperer boards take away the frustration of setting up the hardware for side channel attacks.. You can get your hands on one of the boards at [https://store.newae.com/ The NewAE Store]. As of June 2016, The ChipWhisperer Lite (CW1173) is a great way to get started: it comes with a "victim" already connected, so you can start the tutorials out-of-the-box.
+
ChipWhisperer is maintained by NewAE Technology Inc. The ChipWhisperer boards take away the frustration of setting up the hardware for side channel attacks. You can get your hands on one of the boards at [https://store.newae.com/ The NewAE Store].  
  
= Software =
+
To perform a side channel attack, you need two things:
ChipWhisperer's software is open-source and freely available online.
+
* A '''capture''' board. This is an oscilloscope on steroids: it has special hardware that it uses to capture very small signals with a precisely synchronized clock.  
* If you want a nice, tidy download, check out the [https://www.assembla.com/wiki/show/chipwhisperer/ChipWhisperer_Software_Firmware_Releases ChipWhisperer Releases]. The information on this page will explain how to download and install the software.
+
* A '''target''' board. This is typically a processor that can be programmed to perform some kind of secure operation.  
* If you're familiar with Git, you can directly clone the [https://www.assembla.com/spaces/chipwhisperer/git/source ChipWhisperer Repository]. This will get you a bleeding-edge copy of the software, which has the most recent bug fixes and the most recent bugs.
+
The simplest way to get started is to get a [[CW1173 ChipWhisperer-Lite]]: this comes with the capture hardware and the target together on a single board. For more advanced work, you can get a [[CW308 UFO Target]], which is a base board that supports many types of targets. Alternatively, you can attack an FPGA target with the [[CW305 Artix FPGA Target]].
  
= Tutorials =
+
== Software ==
 +
ChipWhisperer's software is open-source and freely available online. To get everything set up, follow the instructions at [[Installing ChipWhisperer]]. If you know what you're doing, you can head straight to the [https://github.com/newaetech/chipwhisperer Github page].
 +
 
 +
== Tutorials ==
 
The tutorials on this wiki provide an introduction to ChipWhisperer. The main focus in these tutorials is breaking AES-128; if this is your main goal, start with these three tutorials:
 
The tutorials on this wiki provide an introduction to ChipWhisperer. The main focus in these tutorials is breaking AES-128; if this is your main goal, start with these three tutorials:
 
* [[Tutorial B1 Building a SimpleSerial Project]] to get used to the ChipWhisperer framework
 
* [[Tutorial B1 Building a SimpleSerial Project]] to get used to the ChipWhisperer framework
Line 18: Line 21:
 
{{Template:Tutorials}}
 
{{Template:Tutorials}}
  
= Further Reading =
+
== Further Reading ==
 
Some various papers, slides, books, and other places to look to get you excited about side channel analysis...
 
Some various papers, slides, books, and other places to look to get you excited about side channel analysis...
 
* The [http://www.cryptography.com/public/pdf/DPA.pdf original paper on side channel analysis], which started all of this
 
* The [http://www.cryptography.com/public/pdf/DPA.pdf original paper on side channel analysis], which started all of this
Line 26: Line 29:
 
* The book [http://www.amazon.com/Power-Analysis-Attacks-Revealing-Secrets/dp/1441940391/n0fa0-20 Power Analysis Attacks], which is a great overview of the math involved and provides tons of examples of attacks
 
* The book [http://www.amazon.com/Power-Analysis-Attacks-Revealing-Secrets/dp/1441940391/n0fa0-20 Power Analysis Attacks], which is a great overview of the math involved and provides tons of examples of attacks
 
* The book [http://www.amazon.com/Understanding-Cryptography-Textbook-Practitioners-ebook/dp/B00475ARKM/n0fa0-20 Understanding Cryptography] for an introduction to cryptography algorthms
 
* The book [http://www.amazon.com/Understanding-Cryptography-Textbook-Practitioners-ebook/dp/B00475ARKM/n0fa0-20 Understanding Cryptography] for an introduction to cryptography algorthms
 +
* [[Academic Papers]] that use ChipWhisperer for various attacks and security testing.
 +
 +
[[Category:Introduction]]

Latest revision as of 05:30, 1 May 2018

Interested in side channel analysis? This page should help you get some ideas of where to start.

Hardware

ChipWhisperer is maintained by NewAE Technology Inc. The ChipWhisperer boards take away the frustration of setting up the hardware for side channel attacks. You can get your hands on one of the boards at The NewAE Store.

To perform a side channel attack, you need two things:

  • A capture board. This is an oscilloscope on steroids: it has special hardware that it uses to capture very small signals with a precisely synchronized clock.
  • A target board. This is typically a processor that can be programmed to perform some kind of secure operation.

The simplest way to get started is to get a CW1173 ChipWhisperer-Lite: this comes with the capture hardware and the target together on a single board. For more advanced work, you can get a CW308 UFO Target, which is a base board that supports many types of targets. Alternatively, you can attack an FPGA target with the CW305 Artix FPGA Target.

Software

ChipWhisperer's software is open-source and freely available online. To get everything set up, follow the instructions at Installing ChipWhisperer. If you know what you're doing, you can head straight to the Github page.

Tutorials

The tutorials on this wiki provide an introduction to ChipWhisperer. The main focus in these tutorials is breaking AES-128; if this is your main goal, start with these three tutorials:

A full list of tutorials is:

Further Reading

Some various papers, slides, books, and other places to look to get you excited about side channel analysis...