Open main menu

User contributions

Gdeon

21 June 2016

  • Tutorial A5 Breaking AES-256 Bootloader

    ‎Appendix D: AES-256 13th Round Key Script: Updated script

    09:50

    +1,176

  • Tutorial A5 Breaking AES-256 Bootloader

    ‎Appendix C: AES-256 14th Round Key Script: Updated script

    09:48

    +1,221

  • Tutorial A5 Breaking AES-256 Bootloader

    ‎Capturing the Traces: Fixed notes on scripts

    09:43

    +1,070

  • Tutorial A5 Breaking AES-256 Bootloader

    ‎Appendix A: Target Code: Added new code

    09:35

    -2,832

  • Tutorial A5 Breaking AES-256 Bootloader

    ‎Appendix B: Capture Script

    09:30

    -1

  • Tutorial A5 Breaking AES-256 Bootloader

    ‎13th Round Key

    09:30

  • Tutorial A5 Breaking AES-256 Bootloader

    ‎14th Round Key

    09:29

    +5

  • Tutorial A5 Breaking AES-256 Bootloader

    ‎14th Round Key: Added link to appendix

    09:29

    +119

  • Tutorial A5 Breaking AES-256 Bootloader

    Renamed appendices

    09:27

    +3,866

  • Tutorial A5-Bonus Breaking AES-256 Bootloader

    Dumped things into this page

    09:22

  • Tutorial A5 Breaking AES-256 Bootloader

    ‎Appendix D AES-256 IV Attack Script: Removed

    09:21

    -3,012

  • Tutorial A5 Breaking AES-256 Bootloader

    ‎Timing Attacks for Signature: Removed

    09:21

    -34

  • Tutorial A5 Breaking AES-256 Bootloader

    ‎Analysis of Power Traces for IV: Removed

    09:20

    -1,306

  • Tutorial A5 Breaking AES-256 Bootloader

    Added section

    09:12

    +232

  • Tutorial A5 Breaking AES-256 Bootloader

    Weird typo

    09:08

    -21

  • Tutorial B8 Profiling Attacks (Manual Template Attack)

    Added tutorial category

    09:03

    +23

  • Tutorial A5 Breaking AES-256 Bootloader

    Added tutorial category

    09:02

    +23

  • Tutorial A5 Breaking AES-256 Bootloader

    ‎Setting up the Hardware: Rewrite

    08:59

    +912

  • Tutorial A5 Breaking AES-256 Bootloader

    ‎Recovering the Encryption Key: Rework

    08:44

    -147

  • Tutorial A5 Breaking AES-256 Bootloader

    ‎13th Round Key: Rewrite

    08:37

    -722

  • File:Tutorial-A5-Results-Round-13.PNG

    no edit summary

    08:35

  • Tutorial A5 Breaking AES-256 Bootloader

    ‎Analysis of Encrypted Files

    07:28

    -39

  • Tutorial A5 Breaking AES-256 Bootloader

    Took out warning

    07:05

    -63

  • Tutorial A5 Breaking AES-256 Bootloader

    ‎14th Round Key: Rewrite

    07:03

    -388

  • File:Tutorial-A5-Results-Right-Key.PNG

    no edit summary

    07:01

  • File:Tutorial-A5-Results-Wrong-Key.PNG

    no edit summary

    06:57

  • File:Tutorial-A5-Hardware-Model.PNG

    no edit summary

    06:39

  • File:Tutorial-A5-Plot-Traces.PNG

    no edit summary

    06:33

  • Tutorial A5 Breaking AES-256 Bootloader

    ‎Capturing the Traces: Added image

    05:56

    +43

  • File:Tutorial-A5-Capture.PNG

    no edit summary

    05:52

  • Tutorial A5 Breaking AES-256 Bootloader

    ‎Analyzing of Power Traces for Key: Added intro and changed section names

    05:50

    -73

  • Tutorial A5 Breaking AES-256 Bootloader

    ‎Capturing the Traces: Rewrite

    05:46

    -219

  • Tutorial A5 Breaking AES-256 Bootloader

    ‎Setting up the Hardware: Changed hardware

    05:27

    -1,301

  • Tutorial A5 Breaking AES-256 Bootloader

    Reformatted sections

    05:20

    -29

  • Tutorial A5 Breaking AES-256 Bootloader

    ‎Attacking AES-256: Moved contents to theory page

    05:18

    -3,628

  • Extending AES-128 Attacks to AES-256

    Removed extra sections.

    05:14

    +26

  • Extending AES-128 Attacks to AES-256

    Added theory on attack

    05:02

    +3,561

  • Extending AES-128 Attacks to AES-256

    Added page

    04:32

  • Main Page

    ‎Theory: Added AES-256 page

    04:07

    +43

20 June 2016

  • Tutorial A5 Breaking AES-256 Bootloader

    ‎Details of AES-256 CBC: Rewrote section

    10:57

    +993

  • Tutorial A5 Breaking AES-256 Bootloader

    ‎Background: Minor correctness issue

    10:42

    -20

  • Tutorial A5 Breaking AES-256 Bootloader

    ‎Bootloader Design: Cleaned up communication protocol

    10:37

    -182

  • Tutorial A5 Breaking AES-256 Bootloader

    ‎Background: Added high-level background info

    10:22

    +1,831

  • Tutorial A5 Breaking AES-256 Bootloader

    ‎Bootloader Design

    08:26

    -37

9 June 2016

  • Tutorial B7 Profiling Attacks (with HW Assumption)

    ‎Capturing the Attack Traces: Don't need to close the program...

    08:33

    +4

  • Tutorial B7 Profiling Attacks (with HW Assumption)

    ‎Capturing the Traces: Application no longer needs to be closed between campaigns

    08:32

    -59

2 June 2016

  • Quality Control Guidelines

    Placeholder to make page

    06:13

  • File:Luna.jpg

    no edit summary

    06:12

  • Main Page

    ‎Source Code and Releases: Fixed broken link

    06:05

    +90

  • Getting Started

    Added page

    05:58

older 50
  • ChipWhisperer Wiki

    • Mobile
    • Desktop
  • Privacy