As of August 2020 the site you are on (wiki.newae.com) is deprecated, and content is now at rtfm.newae.com.

CHES2016 CTF

From ChipWhisperer Wiki
Revision as of 06:38, 14 May 2016 by Coflynn (Talk | contribs)

Jump to: navigation, search

CHES 2016 will have a brand new Capture The Flag (CTF) event, run by Colin O'Flynn, with resources by NewAE Technology Inc. This event will challenge novice and advanced embedded security researchers alike, by providing a platform to exchange AES implementations with various countermeasures (including against power analysis, and against firmware analysis using white box crypto).

Access the website at http://ctf.newae.com .

Attack Website

There are two types of cryptographic implementations available for your browsing pleasure. They are either:

1. AES-128 running on Atmel XMEGA, with power analysis. Key not stored in firmware (attack via DPA).

2. AES-128 running on Linux computer, without power analysis. Key stored in firmware (White box).

As a user, you can submit source-code to accomplish #1, which will run the code on an embedded hardware platform.

Side Channel Power Analysis

White Box Cryptography