As of August 2020 the site you are on ( is deprecated, and content is now at


Jump to: navigation, search

Tutorial B6 Breaking AES (Manual CPA Attack)

19 bytes added, 15:01, 18 May 2016
The CPA Attack Theory: Minor fixes
As a background on the CPA attack, please see the section [[Correlation Power Analysis]]. It's assumed you've read that section and come back to this. Ok, you've done that? Good let's continue.
Assuming you ''actually'' read that, it should be apparant apparent that there is a few things we need to accomplish:
# Reading the data- , which consists of the analog waveform (trace) and input text sent to the encryption core
# Making the power leakage model, where it takes a known input text along with a guess of the key byte
# Implementing the Correlation correlation equation, and then looping through all the traces
# Ranking the output of the correlation equation to determine the most likely key

Navigation menu