Open main menu

User contributions

Gdeon

12 August 2016

  • CW308T-87C51

    no edit summary

    11:36

    +296

5 July 2016

  • Attacking TEA with CPA

    ‎Attacking the Key

    07:17

    +6,085

  • Attacking TEA with CPA

    ‎Searching for Leakage

    06:31

    +4,377

  • File:TEA-Sorted-Traces.png

    no edit summary

    06:09

  • Attacking TEA with CPA

    ‎Capture

    05:47

    +1,569

  • Attacking TEA with CPA

    no edit summary

    05:14

    +1,569

4 July 2016

  • Attacking TEA with CPA

    ‎TEA Encryption

    12:23

    +1,437

  • Attacking TEA with CPA

    Created page with "= TEA Encryption = TEA (Tiny Encryption Algorithm) is a simple encryption algorithm that is meant to be simple enough to memorize. It uses a 128 bit key to encrypt 64 bits of..."

    10:58

  • Embedded Attacks

    ‎Half-Baked Ideas

    09:02

    +1

  • Embedded Attacks

    ‎Half-Baked Ideas

    09:02

    +27

29 June 2016

  • Tutorial A6 Replication of Ilya Kizhvatov's XMEGA® Attack

    Added tutorial category

    06:55

    +23

28 June 2016

  • Tutorial A7 Glitch Buffer Attacks

    ‎Ideas

    12:04

    +3,024

  • Tutorial A7 Glitch Buffer Attacks

    ‎Attack Script & Results

    11:35

    +1,945

  • Tutorial A7 Glitch Buffer Attacks

    ‎Ideas: Added script

    11:24

    +4,466

  • Tutorial A7 Glitch Buffer Attacks

    ‎Disassembly

    11:09

    +1,174

  • Tutorial A7 Glitch Buffer Attacks

    ‎The Attack Plan

    10:09

    +1,512

  • Tutorial A7 Glitch Buffer Attacks

    ‎Bootloader Setup: Added build description

    09:51

    +543

  • Tutorial A7 Glitch Buffer Attacks

    ‎Background: Added section

    09:46

    +3,023

  • Tutorial A7 Glitch Buffer Attacks

    Made page

    07:34

  • Template:Tutorials

    Added tutorial A7

    07:27

    +40

23 June 2016

  • Tutorial A5-Bonus Breaking AES-256 Bootloader

    ‎Appendix A: IV Attack Script: Fixed link

    10:16

    +1

  • Tutorial A5 Breaking AES-256 Bootloader

    ‎Next Steps: Fixed name

    10:08

    -2

  • Tutorial A5-Bonus: Breaking AES-256 Bootloader

    Gdeon moved page Tutorial A5-Bonus: Breaking AES-256 Bootloader to Tutorial A5-Bonus Breaking AES-256 Bootloader: Matching other tutorial names

    10:07

  • Tutorial A5-Bonus Breaking AES-256 Bootloader

    Gdeon moved page Tutorial A5-Bonus: Breaking AES-256 Bootloader to Tutorial A5-Bonus Breaking AES-256 Bootloader: Matching other tutorial names

    m

    10:07

  • Template:Tutorials

    Added A5-bonus tutorial

    10:06

    +52

  • Tutorial A5-Bonus Breaking AES-256 Bootloader

    Not under construction anymore!

    10:06

    -21

  • Tutorial A5-Bonus Breaking AES-256 Bootloader

    ‎Finding a Single Byte: Finished

    10:04

    +6,645

  • File:Tutorial-A5-Bonus-Signature.PNG

    no edit summary

    09:57

  • Tutorial A5-Bonus Breaking AES-256 Bootloader

    ‎Attacking the Signature: Removed

    09:31

    -29

  • Tutorial A5-Bonus Breaking AES-256 Bootloader

    ‎Appendix D AES-256 IV Attack Script: Removed

    09:31

    -3,012

  • Tutorial A5-Bonus Breaking AES-256 Bootloader

    ‎Attacking the Signature: Started section

    09:30

    +2,473

  • Tutorial A5-Bonus Breaking AES-256 Bootloader

    ‎Background: Removed

    09:09

    -158

  • Tutorial A5-Bonus Breaking AES-256 Bootloader

    ‎The Other 127: Fixed Appendix link

    09:08

    +23

  • Tutorial A5-Bonus Breaking AES-256 Bootloader

    ‎Appendix A: IV Attack Script: Fixed link

    09:08

    +8

  • Tutorial A5-Bonus Breaking AES-256 Bootloader

    ‎Appendix D AES-256 IV Attack Script: Snuck in Appendix A

    09:07

    +1,341

  • Tutorial A5-Bonus Breaking AES-256 Bootloader

    ‎The Other 127: Added section

    09:05

    -618

  • Tutorial A5-Bonus Breaking AES-256 Bootloader

    ‎A 1-Bit Attack: Finished 1 bit attack

    08:49

    +1,468

  • File:Tutorial-A5-Bonus-Diff-1.PNG

    no edit summary

    08:47

  • File:A5-Bonus-Diff-0-Zoom.PNG

    no edit summary

    08:41

  • File:Tutorial-A5-Bonus-Diff-0.PNG

    no edit summary

    08:38

  • Tutorial A5-Bonus Breaking AES-256 Bootloader

    ‎Attacking the IV: Started attack

    07:48

    +4,471

  • Tutorial A5-Bonus Breaking AES-256 Bootloader

    ‎Power Traces: Added more capture info

    06:56

    +199

  • Tutorial A5-Bonus Breaking AES-256 Bootloader

    ‎Power Traces: Described attacks

    06:40

    +423

  • Tutorial A5-Bonus Breaking AES-256 Bootloader

    ‎Matching Power to Code: Removed

    06:35

    -31

  • Tutorial A5-Bonus Breaking AES-256 Bootloader

    ‎Attacking the IV: Done part of this

    06:35

    -111

  • Tutorial A5-Bonus Breaking AES-256 Bootloader

    ‎Power Traces: Added capture information and sample trace

    06:34

    +1,521

  • File:Tutorial-A5-Bonus-Trace-Notes.PNG

    no edit summary

    06:34

  • Tutorial A5-Bonus Breaking AES-256 Bootloader

    Moved source code

    06:05

    +321

  • Tutorial A5-Bonus Breaking AES-256 Bootloader

    ‎Background: Added source code

    05:59

    +3,346

22 June 2016

  • Tutorial A5-Bonus Breaking AES-256 Bootloader

    Added brainstorm for IV attack

    14:02

    +389

older 50
  • ChipWhisperer Wiki

    • Mobile
    • Desktop
  • Privacy