|As of August 2020 the site you are on (wiki.newae.com) is deprecated, and content is now at rtfm.newae.com.|
Tutorial B11 Breaking RSA
This tutorial has been updated for ChipWhisperer 5 release. If you are using 4.x.x or 3.x.x see the "V4" or "V3" link in the sidebar.
This tutorial works differently than in V4, now utilizing a fault attack instead of a power analysis attack.
|B11: Breaking RSA|
|Software Release||V3 / V4 / V5|
This tutorial will introduce you to measuring the power consumption of a device under attack. It will demonstrate how you can view the difference between assembly instructions. In ChipWhisperer 5 Release, the software documentation is now held outside the wiki. See links below.
To see background on the tutorials see the Tutorial Introduction on ReadTheDocs, which explains what the links below mean. These wiki pages (that you are reading right now) only hold the hardware setup required, and you have to run the Tutorial via the Jupyter notebook itself. The links below take you to the expected Jupyter output from each tutorial, so you can compare your results to the expected/known-good results.
Running the tutorial uses the referenced Jupyter notebook file.
- Jupyter file: Fault_5-RSA_Fault_Attack.ipynb
This tutorial is not available for XMEGA targets.
ChipWhisperer-Lite ARM / STM32F3 Target
See the following for using:
- ChipWhisperer-Lite 32-bit (STM32F3 Target)
- ChipWhisperer-Lite Capture + STM32F3 Target on UFO Board (including NAE-SCAPACK-L1/L2 users)
- ChipWhisperer-Pro + STM32F3 Target on UFO Board
ChipWhisperer Nano Target
This tutorial is not available for the ChipWhisperer Nano.