From 35C3 Wiki
|Description||Power Side Channel Analysis on the cheapiest|
|Keyword(s)||hardware, software, embedded, hacking, security|
|Language||en - English |
en - English
(Click here to refresh this page.)
|Starts at||2018/12/29 14:00|
|Ends at||2018/12/29 16:00|
|Location||Room:Seminar room 14-15|
|Starts at||2018/12/28 21:30|
|Ends at||2018/12/28 23:30|
|Location||Room:Lecture room M2|
The cheapiest side channel workshop
FULL: Both these workshop sessions are now FULL, unfortunately. Come to our lightning talk!
Want to recover cryptographic keys by just looking at a chip's power usage, for the price of a few beers?
In this workshop we will show you how to break AES with just ~5 euro of equipment (plus your laptop and a bit of code).
Following in the tradition of the ChipWhisperer, but with even cheaper hardware, come and join the world of hardware side channel attacks. With a simple custom PCB (schematics provided), a cheap off-the-shelf MCU and a handful of supporting components, you'll have no problem stealing the keys.
You'll need to bring (per 2 people)
- Laptop (which you're willing to connect to home made electronics) - Virtualbox
You'll need to know:
- Some programming (although you don't have to code anything) - Fundamentals of cryptography (what is AES, what's it for?) - Basics of electronics (you're going to need to connect some wires)
Contact @noopwafel on twitter of Albert at email@example.com if you would like to join or know more
When joining please let us know the state of the VM checklist below.
Before attending the workshop please ensure your VM works. If you have any trouble, please contact @noopwafel or Albert so we can help you (The workshop slot is kinda short).
1. Download the VM: https://drive.google.com/open?id=1V9GH4fbhDvJyLDC7cq4mdTLp6-srp8hC 2. Can the VM boot? 3. Can you connect a random USB device to the VM? (for instance, your webcam) (DO NOT turn off USB2 hub) If not, perform the following on YOUR machine (not the VM): a. if you're on Debian you need to add the non-free/contrib repositories. sudo apt-get update sudo apt-get install virtualbox-ext-pack b. add your user to the vboxusers group sudo adduser <YOUR LOGIN> vboxusers logout and log back in again 4. Done! user: jlsca pass: jlsca user: root pass: root