##: Notice that the traces are synchronized for the first 7000 samples, but become unsynchronized later. This fact will be important later in the tutorial.
# Set up the attack in the ''Attack''
settings tab:## Leave the Crypto Algorithm set to AES-128. ( Remember that we' re applying the AES-128 attack to half of the AES-256 key!)## Change the Leakage Model to '' HW: AES Inv SBox Output, First Round ( Dec) ''. ## If you're finding the attack very slow, narrow down the attack a bit. Normally, this requires a bit of investigation to determine which ranges of the trace are important. Here, you can use the range from 2900 for 4200. The default settings will also work fine!##: [[File:Tutorial-A5-Hardware-Model. PNG|image]]
# Note that we do ''not'' know the secret encryption key, so we cannot highlight the correct key automatically. If you want to fix this, the ''Results'' settings tab has a Highlighted Key setting. Change this to Override mode and enter the key <code>ea 79 79 20 c8 71 44 7d 46 62 5f 51 85 c1 3b cb</code>.
# Finally, run the attack by switching to the ''Results Table'' tab and then hitting the ''
There are a few ways to check the results of the attack. First, the results table will show the best guesses for each subkey. With the highlight override enabled, the red bytes should be the best guesses for every single subkey: