As of August 2020 the site you are on ( is deprecated, and content is now at


Jump to: navigation, search

Tutorial B6 Breaking AES (Manual CPA Attack)

1 byte removed, 15:01, 18 May 2016
The CPA Attack Theory: Minor fix
Assuming you ''actually'' read that, it should be apparent that there is a few things we need to accomplish:
# Reading the data , which consists of the analog waveform (trace) and input text sent to the encryption core
# Making the power leakage model, where it takes a known input text along with a guess of the key byte
# Implementing the correlation equation, and then looping through all the traces

Navigation menu