Open main menu

Page history

Tutorial A5 Breaking AES-256 Bootloader

21 June 2016

  • Gdeon

    →‎Appendix D AES-256 IV Attack Script: Removed

    09:21

    -3,012

  • Gdeon

    →‎Timing Attacks for Signature: Removed

    09:21

    -34

  • Gdeon

    →‎Analysis of Power Traces for IV: Removed

    09:20

    -1,306

  • Gdeon

    Added section

    09:12

    +232

  • Gdeon

    Weird typo

    09:08

    -21

  • Gdeon

    Added tutorial category

    09:02

    +23

  • Gdeon

    →‎Setting up the Hardware: Rewrite

    08:59

    +912

  • Gdeon

    →‎Recovering the Encryption Key: Rework

    08:44

    -147

  • Gdeon

    →‎13th Round Key: Rewrite

    08:37

    -722

  • Gdeon

    →‎Analysis of Encrypted Files

    07:28

    -39

  • Gdeon

    Took out warning

    07:05

    -63

  • Gdeon

    →‎14th Round Key: Rewrite

    07:03

    -388

  • Gdeon

    →‎Capturing the Traces: Added image

    05:56

    +43

  • Gdeon

    →‎Analyzing of Power Traces for Key: Added intro and changed section names

    05:50

    -73

  • Gdeon

    →‎Capturing the Traces: Rewrite

    05:46

    -219

  • Gdeon

    →‎Setting up the Hardware: Changed hardware

    05:27

    -1,301

  • Gdeon

    Reformatted sections

    05:20

    -29

  • Gdeon

    →‎Attacking AES-256: Moved contents to theory page

    05:18

    -3,628

20 June 2016

  • Gdeon

    →‎Details of AES-256 CBC: Rewrote section

    10:57

    +993

  • Gdeon

    →‎Background: Minor correctness issue

    10:42

    -20

  • Gdeon

    →‎Bootloader Design: Cleaned up communication protocol

    10:37

    -182

  • Gdeon

    →‎Background: Added high-level background info

    10:22

    +1,831

  • Gdeon

    →‎Bootloader Design

    08:26

    -37

2 June 2016

  • Gdeon

    →‎Details of AES-256 CBC: Fixed broken link

    05:14

    -6

20 May 2016

  • Gdeon

    Added template

    06:14

    +24

29 March 2016

  • Coflynn

    no edit summary

    10:38

    +13

  • Coflynn

    Created page with "'''''THIS TUTORIAL IS INCOMPLETE AND STILL BEING UPDATED''''' This tutorial will take you through a complete attack on an encrypted bootloader using AES-256. This demonstrate..."

    10:31

    +41,239

  • ChipWhisperer Wiki

    • Mobile
    • Desktop
  • Privacy