Changes

Tutorial B7 Profiling Attacks (with HW Assumption)

51 bytes removed, 16:49, 9 June 2016
m
no edit summary
=== Capturing the Attack Traces ===
# Make a new project and follow steps 2 and 3 of the previous section. Leave the ''Key/Text Pattern'' as defaultBasic, where the encryption key is fixed and the plaintext is random.
# Save the project now in the same directory as the <code>.cwp</code> file from the previous section, giving it a name indicating the key is '''fixed''' and text is '''random'''. For example you could call it <code>tut_fixedkey_randplain.cwp</code>, again saving it in the same directory as the previous file.
# Change the number of traces to be ''20'': by comparison the profiling attack will require less attack traces compared to the CPA attack.
218
edits