As of August 2020 the site you are on (wiki.newae.com) is deprecated, and content is now at rtfm.newae.com.

Changes

Jump to: navigation, search

Tutorial CW305-2 Breaking AES on FPGA

820 bytes added, 20:41, 16 January 2017
Analysis
= Analysis =
Once we have our data, the analysis is pretty straightforward: a standard CPA attack is easy to do in the ChipWhisperer Analyzer. To set this up, open the Analyzer and load the captured data. Then, only one setting needs to be changed. In the Attack tab, change the Hardware Model to "HD: AES Last- Load projectRound State":- Most default settings are fine[[File:CW305Attack.PNG]] Once this is done, start the attack. The analysis will take some time - Change leakage 5000 traces is quite a bit of data to HDcrunch. However, we should be rewarded with the secret key:- Results[[File:CW305Results.PNG]] Notice how small the correlations are in this data! In the standard XMEGA software AES attack, we saw correlations on the order of 98%; this FPGA attack gave us closer to 10%. Make sure to take a good look at the other output (correlation vs. traces, PGE vs traces, etc) to get a good idea of how much work is required for a successful attack on the Artix target.
= Suggestions =
Approved_users
510
edits

Navigation menu