User contributions
23 June 2016
22 June 2016
21 June 2016
Tutorial A5 Breaking AES-256 Bootloader
Appendix D: AES-256 13th Round Key Script: Updated script
+1,176
Tutorial A5 Breaking AES-256 Bootloader
Appendix C: AES-256 14th Round Key Script: Updated script
+1,221
Tutorial A5 Breaking AES-256 Bootloader
Capturing the Traces: Fixed notes on scripts
+1,070
Tutorial A5 Breaking AES-256 Bootloader
Appendix A: Target Code: Added new code
-2,832
Tutorial A5 Breaking AES-256 Bootloader
Appendix B: Capture Script
-1
Tutorial A5 Breaking AES-256 Bootloader
13th Round Key
Tutorial A5 Breaking AES-256 Bootloader
14th Round Key
+5
Tutorial A5 Breaking AES-256 Bootloader
14th Round Key: Added link to appendix
+119
Tutorial A5 Breaking AES-256 Bootloader
Renamed appendices
+3,866
Tutorial A5-Bonus Breaking AES-256 Bootloader
Dumped things into this page
Tutorial A5 Breaking AES-256 Bootloader
Appendix D AES-256 IV Attack Script: Removed
-3,012
Tutorial A5 Breaking AES-256 Bootloader
Timing Attacks for Signature: Removed
-34
Tutorial A5 Breaking AES-256 Bootloader
Analysis of Power Traces for IV: Removed
-1,306
Tutorial A5 Breaking AES-256 Bootloader
Added section
+232
Tutorial A5 Breaking AES-256 Bootloader
Weird typo
-21
Tutorial B8 Profiling Attacks (Manual Template Attack)
Added tutorial category
+23
Tutorial A5 Breaking AES-256 Bootloader
Added tutorial category
+23
Tutorial A5 Breaking AES-256 Bootloader
Setting up the Hardware: Rewrite
+912
Tutorial A5 Breaking AES-256 Bootloader
Recovering the Encryption Key: Rework
-147
Tutorial A5 Breaking AES-256 Bootloader
13th Round Key: Rewrite
-722
File:Tutorial-A5-Results-Round-13.PNG
no edit summary
Tutorial A5 Breaking AES-256 Bootloader
Analysis of Encrypted Files
-39
Tutorial A5 Breaking AES-256 Bootloader
Took out warning
-63
Tutorial A5 Breaking AES-256 Bootloader
14th Round Key: Rewrite
-388
File:Tutorial-A5-Results-Right-Key.PNG
no edit summary
File:Tutorial-A5-Results-Wrong-Key.PNG
no edit summary
File:Tutorial-A5-Hardware-Model.PNG
no edit summary
File:Tutorial-A5-Plot-Traces.PNG
no edit summary
Tutorial A5 Breaking AES-256 Bootloader
Capturing the Traces: Added image
+43
File:Tutorial-A5-Capture.PNG
no edit summary
Tutorial A5 Breaking AES-256 Bootloader
Analyzing of Power Traces for Key: Added intro and changed section names
-73
Tutorial A5 Breaking AES-256 Bootloader
Capturing the Traces: Rewrite
-219
Tutorial A5 Breaking AES-256 Bootloader
Setting up the Hardware: Changed hardware
-1,301
Tutorial A5 Breaking AES-256 Bootloader
Reformatted sections
-29
Tutorial A5 Breaking AES-256 Bootloader
Attacking AES-256: Moved contents to theory page
-3,628
Extending AES-128 Attacks to AES-256
Removed extra sections.
+26
Extending AES-128 Attacks to AES-256
Added theory on attack
+3,561
Extending AES-128 Attacks to AES-256
Added page
Main Page
Theory: Added AES-256 page
+43
20 June 2016
Tutorial A5 Breaking AES-256 Bootloader
Details of AES-256 CBC: Rewrote section
+993
Tutorial A5 Breaking AES-256 Bootloader
Background: Minor correctness issue
-20
Tutorial A5 Breaking AES-256 Bootloader
Bootloader Design: Cleaned up communication protocol
-182
Tutorial A5 Breaking AES-256 Bootloader
Background: Added high-level background info
+1,831
Tutorial A5 Breaking AES-256 Bootloader
Bootloader Design
-37
9 June 2016
Tutorial B7 Profiling Attacks (with HW Assumption)
Capturing the Attack Traces: Don't need to close the program...
+4
Tutorial B7 Profiling Attacks (with HW Assumption)
Capturing the Traces: Application no longer needs to be closed between campaigns
-59