As of August 2020 the site you are on (wiki.newae.com) is deprecated, and content is now at rtfm.newae.com.

Changes

Jump to: navigation, search

Tutorial B5 Breaking AES (Straightforward)

313 bytes added, 20:23, 27 September 2018
no edit summary
|capture hardware = CW-Lite, CW-Lite 2-Part, CW-Pro
|Target Device =
|Target Architecture = XMEGA/ARM
|Hardware Crypto = No
|Purchase Hardware =
-------- end --------
</pre>
Like before, if you're using the ARM target, use make PLATFORM=CWLITEARM CRYPTO_TARGET=TINYAES128C.
 
Make sure that the platform is correct.
</li>
* Open the ChipWhisperer Capture software.
* Connect to the ChipWhisperer. (You can do this using a script or by filling out the generic settings and connecting to the board yourself.)
* Open the XMEGA Programmer (**Tools > ChipWhisperer-Lite XMEGA Programmer**), or, if you're using the ARM target, open the STM32F Programmer.
* Find the hex file you compiled and program it onto the target.
</li>
Note in previous software versions, this tutorial took you through manual setup. This can still be done (using the GUI), but instead now the API has been made more powerful, so the example configuration script will be used instead.
To do so, simply scroll down and select the "setup_cwlite_xmega_aes.py" fileif you're using the XMEGA target. If you're using the ARM target, select "setup_cwlite_stm32f_aes.py"[[File:cwsetup_scriptselection_xmegaconfig_cwliterun.png|718x718px]]
[[File:cwsetup_scriptselection_xmegaconfig_cwliterunStm32f aes.pngPNG|frameless|798x798px]]
<p>To complete the tutorial, follow these steps:</p><ol start="7" style="list-style-type: decimal;">
<li>Switch to the ''General Settings'' tab</li>
<li>If you wish to change the number of traces, do so here. The default of 50 should be sufficient to break AES though!</li>
Approved_users, administrator
366
edits

Navigation menu