In our quest to understand perceived information, we aim to minimize mathematical formulae and maximize the pleasure of interactive learning. I recommend the original paper for those who prefer a formal explanation (see notes at the end of this tutorial). Let us begin with basic identity information:
In this post, we explore how to use SNR as a distinguisher. To follow along, download the trace set and the notebook. Our goal is to recover the TARGET_BYTE, which for this example is Byte 0 of the S-box out operation, Round 1(of an unprotected software AES implementation). By changing the value of the variable TARGET_BYTE in the provided notebook, you can recover other bytes.
This tutorial and accompanying notebook aim to give the reader the tools to use SNR to evaluate side-channel analysis leakage. We assume the reader to be familiar with DPA attacks and understand the purpose of leakage models. However, to illustrate the concept, we start with an example with blue and green zebras and then parallel to side-channels. The tutorial is a collaboration with Valentina Banciu.
Pffui… I made it! This morning feeling brave and in the mood to procrastrinate, I decided to create a personal website. A full 8h laters I am the proud owner of a new github repo, to host my website, a shiny jekyll install for content creation and a brand-new sublime plugin for markdown editing. I had to write my first post. #IAMONTOPOFTHEWORLD
subscribe via RSS