Hello,
I have a question. Is it still somehow possible to do Tutorial B5-2 Breaking DES on jupyter? Thanks.
Hello,
I have a question. Is it still somehow possible to do Tutorial B5-2 Breaking DES on jupyter? Thanks.
Hi Jax,
The important python bits do in fact run (CPA will run with a DES sbox with appropriate key/text lengths), but the DES tutorial is pretty old so I can’t confirm functionality on a bunch of stuff as of yet. I’m not sure when I’ll be able to run through and test everything, but if you want to try running through the attack on your own, the following info should be helpful:
Alex
Awesome! Thanks.
I just connected Not Arduino to CW lite and while I was running firmware build setup I got this error:
Do you know how to fix it? Thank you.
Hi Alex, just wondering if there’s an updated V5 tutorial for this?
I have not yet tried it (and it’s very much on my list) but I’ll be trying to follow your instructions above to attempt to break DES. It seems to be the forgotten crypto despite still being used in the real world!
We don’t currently have plans for an updated DES tutorial, but the idea should be mostly the same as with AES, at least for software implementations - use the output of the SBox as a leakage model and do a normal CPA attack.
Interesting topic…
I also have intention to run an attack against HW DES implementation.
The good possible candidate is STM32F4 with HW crypto accelerator. At least, it doesn’t have countermeasures to protect AES. Possibly, DES is also not protected.
I am going to implement running of the HW DES engine first to collect DES encrypt power traces and then try to find more details to run DPA/CPA attacks against the DES algorithm.
@Alex_Dewar BTW, are there chances to add the HW DES implementation for the STM32F4 target board in the case if I will provide the solution?
Or DES is totally out of the scope of the ChipWhisperer project?
@NewDwarf did you ever get this going on v5? I am starting to look at it following Alex’s tips but I am sure I’ll be running into issues!