458
edits
As of August 2020 the site you are on (wiki.newae.com) is deprecated, and content is now at rtfm.newae.com. |
Changes
no edit summary
{{Warningbox|This tutorial has been updated for ChipWhisperer 4.0.0 release. If you are using 3.x.x see the "V3" link in the sidebar.}}
{{Infobox tutorial
|name = B5-2: Breaking DES (Straightforward)
|image =
|caption =
|software versions =
|capture hardware = CW-Lite, CW-Lite 2-Part, CW-Pro
|Target Device =
|Target Architecture = XMEGA
|Hardware Crypto = No
|Purchase Hardware =
}}
Follow the same procedure as in : [[Tutorial B5 Breaking AES (Straightforward)]], but:
See the example analyzer script for a complete listing of the required commands. Note that the attack attemps to recover the [[wikipedia:File:deskeyschedulecalcDES-key-schedule.png|800x800pxfirst round key]], which only has 48bits ([[wikipedia:File:DES-f-function.png|8 s-boxes x 6 bits each]]), while the original key has 56 significative bits (64 if we count the parity bits that are irrelevant). So, if we map the first round key, obtained after the attack, to the original key (you can use the provided DES Key Schedule Tool to do it), there will still be 8 bits missing (256 combinations). [[File:deskeyschedulecalc.png]]
In this example, it matches the original key that was:
[[File:key_des.png|800x800px801x801px]] == Links == {{Template:Tutorials}}[[Category:Tutorials]]