As of August 2020 the site you are on (wiki.newae.com) is deprecated, and content is now at rtfm.newae.com. |
Difference between revisions of "Tutorial B8 Profiling Attacks (Manual Template Attack)"
(Created page with "This tutorial is a more hands-on version of the previous tutorial. Rather than getting the ChipWhisperer Analyzer softwa...") |
|||
Line 27: | Line 27: | ||
* Too little data (0 or 1 trace) | * Too little data (0 or 1 trace) | ||
* Flukes + statistics | * Flukes + statistics | ||
+ | |||
+ | {{Template:Tutorials}} |
Revision as of 11:07, 25 May 2016
This tutorial is a more hands-on version of the previous tutorial. Rather than getting the ChipWhisperer Analyzer software to generate the points of interest and the template distributions, this tutorial will work directly with the recorded trace data in Python.
It is highly recommended that you read the theory page on Template Attacks before attempting this tutorial. There is some relatively complex processing involved, and it may be helpful to get a mathematical view on the steps before attempting to program them.
Additionally, this tutorial uses some terminology from previous tutorials, such as Hamming weight and substitution box. If you don't know what these are, Tutorial B6 Breaking AES (Manual CPA Attack) might be an easier starting point.
Contents
Capturing the Traces
Use data from previous tutorial (fixed/random key)
Creating the Template
Steps to make the template
Mention Hamming weight assumption
Loading the Traces
Sorting the Traces
Points of Interest
Covariance Matrices
Performing the Attack
Steps to crack the code (tm)
Loading the Traces
Using the Template
Gotchas
- Too little data (0 or 1 trace)
- Flukes + statistics