As of August 2020 the site you are on (wiki.newae.com) is deprecated, and content is now at rtfm.newae.com.

Changes

Jump to: navigation, search

Tutorial B5 Breaking AES (Straightforward)

18 bytes added, 14:57, 1 May 2018
no edit summary
This tutorial will take you through a complete attack on a software AES implementation. The specific implementation being attacked is a well-known AES implementation written in C, which is likely to be similar to other implementations used by proprietary systems.
== Capturing ==
This tutorial runs on four different hardware targets. You only need to follow the steps for your given hardware.
=== Capturing with ChipWhisperer-Lite/Pro with default XMEGA Target (CW303) ===
WARNING: This video was recorded with API V3.x, some changes happened so please take note.
[[File:Cwlite_demo_video.png|link=http://www.youtube.com/watch?v=MJmkYqA-LeM&hd=1]]
==== Hardware Setup ====
<ol style="list-style-type: decimal;">
</ol>
==== Capturing the Traces ====
[[File:cwsetup_scriptselection.png|889x889px]]
<li>Skip ahead to [[#Analyzing_the_Traces]].</li></ol>
=== Capturing with ChipWhisperer-Lite and UFO Board ===
TODO
== Analyzing the Traces ==
=== Opening File & Viewing Traces ===
<ol style="list-style-type: decimal;">
</ol>
=== Running Attack Script ===
In ChipWhisperer V4.0, we now use attack scripts for everything. As in the capture program, switch to the '''Python Console''' tab & find the attack scripts. There may be additional scripts there, but you should find one called "attack_cpa.py". It has the following contents:
<p>[[File:attack-done2.png|image]]</p></li></ol>
== Next Steps ==
This has only briefly outlined how to perform a CPA attack. You can move onto more advanced tutorials, especially showing you how the actual attack works when performed manually.

Navigation menu