Breaking AES with ChipWhisperer - Piece of scake (Side Channel Analysis 100)
Terrible DPA explanation and sharing my experience solving the side channel analysis challenge "piece of scake" from the rhme2 CTF.
A real DPA tutorial by Colin O'Flynn: https://www.youtube.com/watch?v=OlX-p4AGhWs
The ChipWhisperer AES tutorial: http://www.newae.com/sidechannel/cwdocs/tutorial.html
ChipWhsiperer: http://newae.com/tools/chipwhisperer/
The DPA paper: https://www.rambus.com/introduction-to-differential-power-analysis-and-related-attacks/
rhme2 challenge files: https://github.com/Riscure/Rhme-2016
-=[ 🔴 Stuff I use ]=-
→ Microphone:* https://geni.us/ntg3b
→ Graphics tablet:* https://geni.us/wacom-intuos
→ Camera#1 for streaming:* https://geni.us/sony-camera
→ Lens for streaming:* https://geni.us/sony-lense
→ Connect Camera#1 to PC:* https://geni.us/cam-link
→ Keyboard:* https://geni.us/mech-keyboard
→ Old Microphone:* https://geni.us/mic-at2020usb
US Store Front:* https://www.amazon.com/shop/liveoverflow
-=[ ❤️ Support ]=-
→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join
-=[ 🐕 Social ]=-
→ Twitter: https://twitter.com/LiveOverflow/
→ Website: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/
-=[ 📄 P.S. ]=-
All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
#CTF #HardwareSecurity
Видео Breaking AES with ChipWhisperer - Piece of scake (Side Channel Analysis 100) канала LiveOverflow
A real DPA tutorial by Colin O'Flynn: https://www.youtube.com/watch?v=OlX-p4AGhWs
The ChipWhisperer AES tutorial: http://www.newae.com/sidechannel/cwdocs/tutorial.html
ChipWhsiperer: http://newae.com/tools/chipwhisperer/
The DPA paper: https://www.rambus.com/introduction-to-differential-power-analysis-and-related-attacks/
rhme2 challenge files: https://github.com/Riscure/Rhme-2016
-=[ 🔴 Stuff I use ]=-
→ Microphone:* https://geni.us/ntg3b
→ Graphics tablet:* https://geni.us/wacom-intuos
→ Camera#1 for streaming:* https://geni.us/sony-camera
→ Lens for streaming:* https://geni.us/sony-lense
→ Connect Camera#1 to PC:* https://geni.us/cam-link
→ Keyboard:* https://geni.us/mech-keyboard
→ Old Microphone:* https://geni.us/mic-at2020usb
US Store Front:* https://www.amazon.com/shop/liveoverflow
-=[ ❤️ Support ]=-
→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join
-=[ 🐕 Social ]=-
→ Twitter: https://twitter.com/LiveOverflow/
→ Website: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/
-=[ 📄 P.S. ]=-
All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
#CTF #HardwareSecurity
Видео Breaking AES with ChipWhisperer - Piece of scake (Side Channel Analysis 100) канала LiveOverflow
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Defeat 2FA token because of bad randomness - rhme2 Twistword (Misc 400)](https://i.ytimg.com/vi/RGknqvbhFCY/default.jpg)
![RSA Power Analysis Side-Channel Attack - rhme2](https://i.ytimg.com/vi/bFfyROX7V0s/default.jpg)
![](https://i.ytimg.com/vi/rB4IEhk235c/default.jpg)
![Searching for Bitcoins in GitHub repositories with Google BigQuery](https://i.ytimg.com/vi/Xml4Gx3huag/default.jpg)
![DEF CON 23 - Colin Flynn - Dont Whisper my Chips: Sidechannel and Glitching for Fun and Profit](https://i.ytimg.com/vi/BHqrA8lzz2o/default.jpg)
![Analyzing the Game Network Protocol - Pwn Adventure 3](https://i.ytimg.com/vi/TG_FVzBijrk/default.jpg)
![ChipWhisperer Tutorial #A3: VCC Glitching Attacks against ATMega328](https://i.ytimg.com/vi/hxU5uVbYCYo/default.jpg)
![Remote Debugging ARM Chip with SWD/JTAG - Hardware Wallet Research #3](https://i.ytimg.com/vi/EpA25bCHHtk/default.jpg)
![Introduction to Side-Channel Power Analysis (SCA, DPA)](https://i.ytimg.com/vi/OlX-p4AGhWs/default.jpg)
![Coordinated stepper motor control (arduino)](https://i.ytimg.com/vi/fHAO7SW-SZI/default.jpg)
![What do Nintendo Switch and iOS 9.3 have in common? CVE-2016-4657 walk-through](https://i.ytimg.com/vi/xkdPjbaLngE/default.jpg)
![AES-CTR Cryptography: Reused Key Weakness - HackTheBox Cyber Apocalypse CTF](https://i.ytimg.com/vi/Gtfr1dBGzHg/default.jpg)
![Side-Channel Attacks on Everyday Applications](https://i.ytimg.com/vi/GPwNFrpd1KU/default.jpg)
![AES Explained (Advanced Encryption Standard) - Computerphile](https://i.ytimg.com/vi/O4xNJsjtN6E/default.jpg)
![Hardware Power Glitch Attack (Fault Injection) - rhme2 Fiesta (FI 100)](https://i.ytimg.com/vi/6Pf3pY3GxBM/default.jpg)
![Crazy Steam Phishing Page](https://i.ytimg.com/vi/NWtm4X6L_Cs/default.jpg)
![Voltage (VCC) Glitching Raspberry Pi 3 model B+ with ChipWhisperer-Lite](https://i.ytimg.com/vi/dVkCNiM0PL8/default.jpg)
![A simple Format String exploit example - bin 0x11](https://i.ytimg.com/vi/0WvrSfcdq1I/default.jpg)
![Breaking ECDSA (Elliptic Curve Cryptography) - rhme2 Secure Filesystem v1.92r1 (crypto 150)](https://i.ytimg.com/vi/-UcCMjQab4w/default.jpg)
![Developing a TCP Network Proxy - Pwn Adventure 3](https://i.ytimg.com/vi/iApNzWZG-10/default.jpg)