Tutorial B3-1 Timing Analysis with Power for Password Bypass
This tutorial has been updated for ChipWhisperer 5 release. If you are using 4.x.x or 3.x.x see the "V4" or "V3" link in the sidebar.
B3-1 Timing Analysis with Power for Password Bypass | |
---|---|
Target Architecture | XMEGA/Arm |
Hardware Crypto | No |
Software Release | V3 / V4 / V5 |
This tutorial will introduce you to measuring the power consumption of a device under attack. It will demonstrate how you can view the difference between assembly instructions. In ChipWhisperer 5 Release, the software documentation is now held outside the wiki. See links below.
To see background on the tutorials see the Tutorial Introduction on ReadTheDocs, which explains what the links below mean. These wiki pages (that you are reading right now) only hold the hardware setup required, and you have to run the Tutorial via the Jupyter notebook itself. The links below take you to the expected Jupyter output from each tutorial, so you can compare your results to the expected/known-good results.
Running the tutorial uses the referenced Jupyter notebook file.
- Jupyter file: PA_SPA_1-Timing_Analysis_with_Power_for_Password_Bypass.ipynb
XMEGA Target
See the following for using:
- ChipWhisperer-Lite Classic (XMEGA)
- ChipWhisperer-Lite Capture + XMEGA Target on UFO Board (including NAE-SCAPACK-L1/L2 users)
- ChipWhisperer-Pro + XMEGA Target on UFO Board
ChipWhisperer-Lite ARM / STM32F3 Target
See the following for using:
- ChipWhisperer-Lite 32-bit (STM32F3 Target)
- ChipWhisperer-Lite Capture + STM32F3 Target on UFO Board (including NAE-SCAPACK-L1/L2 users)
- ChipWhisperer-Pro + STM32F3 Target on UFO Board
ChipWhisperer Nano Target
See the following for using:
- ChipWhisperer-Nano