Changes

V5:Getting Started

3,124 bytes added, 20:21, 24 July 2019
Created page with "Interested in side channel analysis? This page should help you get some ideas of where to start. == Hardware == ChipWhisperer is maintained by NewAE Technology Inc. The ChipW..."
Interested in side channel analysis? This page should help you get some ideas of where to start.

== Hardware ==
ChipWhisperer is maintained by NewAE Technology Inc. The ChipWhisperer boards take away the frustration of setting up the hardware for side channel attacks. You can get your hands on one of the boards at [https://store.newae.com/ The NewAE Store].

To perform a side channel attack, you need two things:
* A '''capture''' board. This is an oscilloscope on steroids: it has special hardware that it uses to capture very small signals with a precisely synchronized clock.
* A '''target''' board. This is typically a processor that can be programmed to perform some kind of secure operation.
The simplest way to get started is to get a [[CW1173 ChipWhisperer-Lite]]: this comes with the capture hardware and the target together on a single board. For more advanced work, you can get a [[CW308 UFO Target]], which is a base board that supports many types of targets. Alternatively, you can attack an FPGA target with the [[CW305 Artix FPGA Target]].

== Software ==
ChipWhisperer's software is open-source and freely available online. Our software documentation (including how to install everything) is available on our [https://chipwhisperer.readthedocs.io/en/latest/index.html ReadtheDocs page]. If you know what you're doing, you can head straight to the [https://github.com/newaetech/chipwhisperer Github page].

== Tutorials ==
The tutorials on this wiki provide an introduction to ChipWhisperer. The main focus in these tutorials is breaking AES-128; if this is your main goal, start with these three tutorials:
* [https://chipwhisperer.readthedocs.io/en/latest/tutorials.html#firmware-build-setup Firmware Build Setup] to get used to the ChipWhisperer framework
* [https://chipwhisperer.readthedocs.io/en/latest/tutorials.html#instruction-differences Instruction Differences] to experiment with capturing traces
* [https://chipwhisperer.readthedocs.io/en/latest/tutorials.html#using-chipwhisperer-analyzer-for-correlation-power-analysis-attack Correlation Power Analysis] to break AES!

== Further Reading ==
Some various papers, slides, books, and other places to look to get you excited about side channel analysis...
* The [http://www.cryptography.com/public/pdf/DPA.pdf original paper on side channel analysis], which started all of this
* The [http://www.newae.com/forum/ NewAE Forum] for support or inspiration
* Colin's [http://www.newae.com/files/OFLYNN_WhitePaper.pdf 2013 Whitepaper on ChipWhisperer]
* Colin's [http://www.newae.com/files/CHES2013_Tutorial.pptx Slides from CHES2013]
* The book [http://www.amazon.com/Power-Analysis-Attacks-Revealing-Secrets/dp/1441940391/n0fa0-20 Power Analysis Attacks], which is a great overview of the math involved and provides tons of examples of attacks
* The book [http://www.amazon.com/Understanding-Cryptography-Textbook-Practitioners-ebook/dp/B00475ARKM/n0fa0-20 Understanding Cryptography] for an introduction to cryptography algorthms
* [[Academic Papers]] that use ChipWhisperer for various attacks and security testing.

[[Category:Introduction]]
Approved_users, administrator
366
edits