Hello, Is there a tool I can use to recover the initial key from the 9th round key? I am running a CPA attack on a masked AES-128 implementation and have changed the leakage model from the default s-box output to hamming weight of the 9th round state. I understand that there was a way to do this with ChipWhisperer 4.0.1. Is there a way to do this with the latest version (5.6.1) or will I have to install the older version?
Try the key_schedule_rounds function: Analyzer — ChipWhisperer 5.6.1 documentation