I’m working on the LAB 3_3 of the jupyter sca101 course.
If I use the AVRCRYPTOLIB crypto target, I have no problem finding the key. i can see leakage on any byte of the key.
However, if I use the TINYAES128C crypto target, I don’t see any leakage on any bytes.
Is it a know issue ?
Thanks in advance,
That’s quite interesting. Generally, the TINYAES firmware is a little bit weaker than the AVRCRYPTOLIB firmware, so I would’ve expected the same behaviour here. We don’t test all firmware/lab/hardware combinations, so having stuff like that pop up from time to time isn’t too surprising.
Have you tried the CPA attack on the XMega running TINYAES? If that one works, I wouldn’t worry about the DPA attack not working, as that’s more of a learning tool rather than anything more practical.
CPA does work on XMega running TINYAES so I guess it proves CPA is more efficient than DPA.
Thanks for your answer.