Tutorial A5 Breaking AES-256 Bootloader

81 bytes added, 20:27, 10 October 2018
no edit summary
=== = Continuing the Attack ====
The next step is to program our own leakage model. The following Python code models the Hamming weight model of the 13th round S-box:
== Appendix A: Target Code ==
<pre> syntaxhighlight lang=python>
# -*- coding: utf-8 -*-
raise IOError("Failed to communicate, no response")
== Appendix B: Capture Script ==
# Set the 'Target Module' as 'AES Bootloader' (you need to have that target on your system)
<pre> syntaxhighlight lang=python>
"""Setup script for CWLite/1200 with XMEGA (CW303/CW308-XMEGA/CWLite target)
specifically for Tutorial A5: the AES-256 bootloader attack = "serial_tx" = "clkgen"
== Appendix C: AES-256 14th Round Key Script ==
Approved_users, administrator