LaurenDM / AttackAESCTR

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Recovering the CTR_DRBG state in 256 traces

This is the code that exemplifies the attack described in "Recovering the CTR_DRBG state in 256 traces": https://tches.iacr.org/index.php/TCHES/article/view/8392

For information about JuPyter Notebooks: see https://jupyter.org

The code allows to choose between different devices for the traces.

  • CORTEX : traces from a Cortex M4, using the ChipWhisperer Lite board with STM32F3 target mounted on UFO board
  • DUINO : traces from Arduino Uno device (The traces are too large to upload on Github, but can be sent to you by request)
  • XMEGA : traces from the built-in XMEGA on the ChipWhisperer Lite board

Any questions can be sent to lauren.demeyer@esat.kuleuven.be

About


Languages

Language:Jupyter Notebook 100.0%