As of August 2020 the site you are on (wiki.newae.com) is deprecated, and content is now at rtfm.newae.com.

Changes

Jump to: navigation, search

Getting Started

340 bytes added, 13:30, 1 May 2018
Change header levels
Interested in side channel analysis? This page should help you get some ideas of where to start.
== Hardware ==ChipWhisperer is maintained by NewAE Technology Inc. The ChipWhisperer boards take away the frustration of setting up the hardware for side channel attacks.. You can get your hands on one of the boards at [https://store.newae.com/ The NewAE Store]. As of June 2016, The ChipWhisperer Lite (CW1173) is a great way to get started: it comes with a "victim" already connected, so you can start the tutorials out-of-the-box.
= Software =To perform a side channel attack, you need two things:ChipWhisperer* A 's software ''capture''' board. This is open-source and freely available onlinean oscilloscope on steroids: it has special hardware that it uses to capture very small signals with a precisely synchronized clock.* If you want A '''target''' board. This is typically a nice, tidy download, check out the [https://wwwprocessor that can be programmed to perform some kind of secure operation.assembla.com/wiki/show/chipwhisperer/ChipWhisperer_Software_Firmware_Releases The simplest way to get started is to get a [[CW1173 ChipWhisperer Releases-Lite]. The information on ]: this page will explain how to download comes with the capture hardware and install the softwaretarget together on a single board.* If you're familiar with GitFor more advanced work, you can directly clone the get a [https://www.assembla.com/spaces/chipwhisperer/git/source ChipWhisperer Repository[CW308 UFO Target]. This will get you ], which is a bleeding-edge copy base board that supports many types of the softwaretargets. Alternatively, which has you can attack an FPGA target with the most recent bug fixes and the most recent bugs[[CW305 Artix FPGA Target]].
== Software ==ChipWhisperer's software is open-source and freely available online. To get everything set up, follow the instructions at [[Installing ChipWhisperer]]. If you know what you're doing, you can head straight to the [https://github.com/newaetech/chipwhisperer Github page]. == Tutorials ==
The tutorials on this wiki provide an introduction to ChipWhisperer. The main focus in these tutorials is breaking AES-128; if this is your main goal, start with these three tutorials:
* [[Tutorial B1 Building a SimpleSerial Project]] to get used to the ChipWhisperer framework
{{Template:Tutorials}}
== Further Reading ==
Some various papers, slides, books, and other places to look to get you excited about side channel analysis...
* The [http://www.cryptography.com/public/pdf/DPA.pdf original paper on side channel analysis], which started all of this
* The book [http://www.amazon.com/Power-Analysis-Attacks-Revealing-Secrets/dp/1441940391/n0fa0-20 Power Analysis Attacks], which is a great overview of the math involved and provides tons of examples of attacks
* The book [http://www.amazon.com/Understanding-Cryptography-Textbook-Practitioners-ebook/dp/B00475ARKM/n0fa0-20 Understanding Cryptography] for an introduction to cryptography algorthms
* [[Academic Papers]] that use ChipWhisperer for various attacks and security testing.
 
[[Category:Introduction]]

Navigation menu