I’m successfully able to capture AES traces with my ChipWhisperer-Lite and store them in a project file with the corresponding key and plaintexts, but now I’d like to perform a byte-sized deep learning attack on this data. In order to do that, I assume I need to figure out what part of each overall trace corresponds to each byte of the S-box substitution, so I can zoom in on that area and label it with it’s corresponding output byte. This is where I’m stuck. If anyone could give me some guidance on going about this I would greatly appreciate it!
Check out the output vs. time plot from SCA101 Lab 4-3. The correlation spikes you see will correspond to the point in time where the sbox substitution is happening.