Implementing new model - AES FPGA CPA attack

Hi Ohad,

There’s a few models in there that are definitely non-functional. Anything in there that uses more than one byte of the key won’t work. There are some comments/exceptions in AES128_8bit.py that indicate that there were plans to allow an “attack” with a fully known key (basically you know every byte of the key except the one that you’re guessing), in which case you can easily perform the mixcolumns and key scheduling operations, but I don’t think this was ever actually implemented.

Alex