Changes

Tutorial A5 Breaking AES-256 Bootloader

232 bytes added, 17:12, 21 June 2016
Added section
Peek into <code>supersecret.h</code>, confirm that this is the right key, and celebrate!
 
= Next Steps =
If you want to go further with this tutorial, [[Tutorial A5-Bonus: Breaking AES-256 Bootloader]] continues working with the same firmware to find the remaining secrets in the bootloader (the IV and the signature).
= Analysis of Power Traces for IV =
pt = aes.decrypt(ct)
return getHW(bytearray(pt)[bnum] ^ guess)</pre>
 
= Timing Attacks for Signature =
Approved_users
510
edits