|Event Foundations Friday: Power Side Channel Analysis on the cheapiest|
|Name||Foundations Friday: Power Side Channel Analysis on the cheapiest
|Duration||29 Mar 2019 20:30 - 29 Mar 2019 22:30|
Want to recover cryptographic keys by just looking at a chip's power usage?
In this workshop we will show you how to break AES with just ~5 euro of equipment (plus your laptop and a bit of code).
Following in the tradition of the ChipWhisperer, but with even cheaper hardware, come and join the world of hardware side channel attacks. With a simple custom PCB (schematics provided), a cheap off-the-shelf MCU and a handful of supporting components, you'll have no problem stealing the keys.
- Laptop (which you're willing to connect to homemade electronics) running VirtualBox
- Very basic knowledge of programming/electronics (although you don't have to code anything) and cryptography (what is AES, what's it for?)
At least one person from each group needs to have the VM working before the workshop starts - noopwafel will be around the space beforehand to help with debugging. Download/test instructions:
1. Download the VM (remove the space): https://drive.google.com/ open?id=1V9GH4fbhDvJyLDC7cq4mdTLp6-srp8hC
2. Can the VM boot? Username/password combinations are jlsca/jlsca and root/root
3. Can you connect a random USB device to the VM? (for instance, your webcam) (DO NOT turn off USB2 hub)
If you can't connect USB, perform the following on YOUR machine (not the VM): a. if you're on Debian you need to add the non-free/contrib repositories. sudo apt-get update sudo apt-get install virtualbox-ext-pack b. add your user to the vboxusers group sudo adduser <YOUR LOGIN> vboxusers logout and log back in again
We can cope with about 12 people (6 groups of 2 people).