AES-CCM Attack

Revision as of 08:01, 1 November 2016 by Coflynn (Talk | contribs)

Revision as of 08:01, 1 November 2016 by Coflynn (Talk | contribs)

The following is an overview of the AES-CMM attack done by Eyal Ronen, detailed in his paper TODO ADD LINK. If using this attack please do not cite this page, instead cite the original research paper.

AES-CCM Overview

Background on Attack

Performing Attack

Building Example

Collecting Traces

Step #1: AES-CBC MAC Block #1

Step #2: AES-CBC MAC Block #2

Step #3: Recovery of AES-CTR Nonce

Step #4: Recovery of AES-CBC I.V.

Step #5: AES-CTR Pad

Do you want to try some new features? By joining the beta, you will get access to experimental features, at the risk of encountering bugs and issues.

Okay No thanks