As of August 2020 the site you are on (wiki.newae.com) is deprecated, and content is now at rtfm.newae.com.

Difference between revisions of "CHES2016 CTF"

From ChipWhisperer Wiki
Jump to: navigation, search
(Created page with "[chesworkshop.org|CHES 2016] will have a brand new Capture The Flag (CTF) event, run by Colin O'Flynn. This event will challenge novice and advanced embedded security research...")
 
Line 6: Line 6:
  
 
1. AES-128 running on Atmel XMEGA, with power analysis. Key not stored in firmware (attack via DPA).
 
1. AES-128 running on Atmel XMEGA, with power analysis. Key not stored in firmware (attack via DPA).
 +
 
2. AES-128 running on Linux computer, without power analysis. Key stored in firmware (White box).
 
2. AES-128 running on Linux computer, without power analysis. Key stored in firmware (White box).
  

Revision as of 07:35, 14 May 2016

[chesworkshop.org|CHES 2016] will have a brand new Capture The Flag (CTF) event, run by Colin O'Flynn. This event will challenge novice and advanced embedded security researchers alike, by providing a platform to exchange AES implementations with various countermeasures (including against power analysis, and against firmware analysis using white box crypto).

Attack Website

There are two types of cryptographic implementations available for your browsing pleasure. They are either:

1. AES-128 running on Atmel XMEGA, with power analysis. Key not stored in firmware (attack via DPA).

2. AES-128 running on Linux computer, without power analysis. Key stored in firmware (White box).

As a user, you can submit source-code to accomplish #1, which will run the code on an embedded hardware platform.

Side Channel Power Analysis

White Box Cryptography