As of August 2020 the site you are on (wiki.newae.com) is deprecated, and content is now at rtfm.newae.com.

Changes

Jump to: navigation, search

Tutorial CW305-2 Breaking AES on FPGA

No change in size, 20:13, 16 January 2017
Theoretical Background
In our case, let's suppose that every round of AES is completed in a single clock cycle. Recall the execution of AES:
[[File:AES_Encryption.png|600px300px]]
Here, every blue block is executed in one clock cycle. This means that an excellent candidate for a CPA attack is the difference between the input and output of the final round. It is likely that this state is stored in a port that is updated every round, so we expect that the Hamming distance between the round input and output is the most important factor on the power consumption. Also, the last round is the easiest to attack because it has no MixColumns operation. We'll use this Hamming distance as the target in our CPA attack.
Approved_users
510
edits

Navigation menu