As of August 2020 the site you are on (wiki.newae.com) is deprecated, and content is now at rtfm.newae.com.

Difference between revisions of "Getting Started"

From ChipWhisperer Wiki
Jump to: navigation, search
(Change header levels)
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
 
Interested in side channel analysis? This page should help you get some ideas of where to start.
 
Interested in side channel analysis? This page should help you get some ideas of where to start.
  
= Hardware =
+
== Hardware ==
 
ChipWhisperer is maintained by NewAE Technology Inc. The ChipWhisperer boards take away the frustration of setting up the hardware for side channel attacks. You can get your hands on one of the boards at [https://store.newae.com/ The NewAE Store].  
 
ChipWhisperer is maintained by NewAE Technology Inc. The ChipWhisperer boards take away the frustration of setting up the hardware for side channel attacks. You can get your hands on one of the boards at [https://store.newae.com/ The NewAE Store].  
  
Line 9: Line 9:
 
The simplest way to get started is to get a [[CW1173 ChipWhisperer-Lite]]: this comes with the capture hardware and the target together on a single board. For more advanced work, you can get a [[CW308 UFO Target]], which is a base board that supports many types of targets. Alternatively, you can attack an FPGA target with the [[CW305 Artix FPGA Target]].
 
The simplest way to get started is to get a [[CW1173 ChipWhisperer-Lite]]: this comes with the capture hardware and the target together on a single board. For more advanced work, you can get a [[CW308 UFO Target]], which is a base board that supports many types of targets. Alternatively, you can attack an FPGA target with the [[CW305 Artix FPGA Target]].
  
= Software =
+
== Software ==
 
ChipWhisperer's software is open-source and freely available online. To get everything set up, follow the instructions at [[Installing ChipWhisperer]]. If you know what you're doing, you can head straight to the [https://github.com/newaetech/chipwhisperer Github page].
 
ChipWhisperer's software is open-source and freely available online. To get everything set up, follow the instructions at [[Installing ChipWhisperer]]. If you know what you're doing, you can head straight to the [https://github.com/newaetech/chipwhisperer Github page].
  
= Tutorials =
+
== Tutorials ==
 
The tutorials on this wiki provide an introduction to ChipWhisperer. The main focus in these tutorials is breaking AES-128; if this is your main goal, start with these three tutorials:
 
The tutorials on this wiki provide an introduction to ChipWhisperer. The main focus in these tutorials is breaking AES-128; if this is your main goal, start with these three tutorials:
 
* [[Tutorial B1 Building a SimpleSerial Project]] to get used to the ChipWhisperer framework
 
* [[Tutorial B1 Building a SimpleSerial Project]] to get used to the ChipWhisperer framework
Line 21: Line 21:
 
{{Template:Tutorials}}
 
{{Template:Tutorials}}
  
= Further Reading =
+
== Further Reading ==
 
Some various papers, slides, books, and other places to look to get you excited about side channel analysis...
 
Some various papers, slides, books, and other places to look to get you excited about side channel analysis...
 
* The [http://www.cryptography.com/public/pdf/DPA.pdf original paper on side channel analysis], which started all of this
 
* The [http://www.cryptography.com/public/pdf/DPA.pdf original paper on side channel analysis], which started all of this
Line 29: Line 29:
 
* The book [http://www.amazon.com/Power-Analysis-Attacks-Revealing-Secrets/dp/1441940391/n0fa0-20 Power Analysis Attacks], which is a great overview of the math involved and provides tons of examples of attacks
 
* The book [http://www.amazon.com/Power-Analysis-Attacks-Revealing-Secrets/dp/1441940391/n0fa0-20 Power Analysis Attacks], which is a great overview of the math involved and provides tons of examples of attacks
 
* The book [http://www.amazon.com/Understanding-Cryptography-Textbook-Practitioners-ebook/dp/B00475ARKM/n0fa0-20 Understanding Cryptography] for an introduction to cryptography algorthms
 
* The book [http://www.amazon.com/Understanding-Cryptography-Textbook-Practitioners-ebook/dp/B00475ARKM/n0fa0-20 Understanding Cryptography] for an introduction to cryptography algorthms
 +
* [[Academic Papers]] that use ChipWhisperer for various attacks and security testing.
  
 
[[Category:Introduction]]
 
[[Category:Introduction]]

Latest revision as of 06:30, 1 May 2018

Interested in side channel analysis? This page should help you get some ideas of where to start.

Hardware

ChipWhisperer is maintained by NewAE Technology Inc. The ChipWhisperer boards take away the frustration of setting up the hardware for side channel attacks. You can get your hands on one of the boards at The NewAE Store.

To perform a side channel attack, you need two things:

  • A capture board. This is an oscilloscope on steroids: it has special hardware that it uses to capture very small signals with a precisely synchronized clock.
  • A target board. This is typically a processor that can be programmed to perform some kind of secure operation.

The simplest way to get started is to get a CW1173 ChipWhisperer-Lite: this comes with the capture hardware and the target together on a single board. For more advanced work, you can get a CW308 UFO Target, which is a base board that supports many types of targets. Alternatively, you can attack an FPGA target with the CW305 Artix FPGA Target.

Software

ChipWhisperer's software is open-source and freely available online. To get everything set up, follow the instructions at Installing ChipWhisperer. If you know what you're doing, you can head straight to the Github page.

Tutorials

The tutorials on this wiki provide an introduction to ChipWhisperer. The main focus in these tutorials is breaking AES-128; if this is your main goal, start with these three tutorials:

A full list of tutorials is:

Further Reading

Some various papers, slides, books, and other places to look to get you excited about side channel analysis...