Paper 2014/204

ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research

Colin O'Flynn and Zhizhang (David) Chen

Abstract

This paper introduces a complete side channel analysis toolbox, inclusive of the analog capture hardware, target device, capture software, and analysis software. The highly modular design allows use of the hardware and software with a variety of existing systems. The hardware uses a synchronous capture method which greatly reduces the required sample rate, while also reducing the data storage requirement, and improving synchronization of traces. The synchronous nature of the hardware lends itself to fault injection, and a module to generate glitches of programmable width is also provided. The entire design (hardware and software) is open-source, and maintained in a publicly available repository. Several long example capture traces are provided for researchers looking to evaluate standard cryptographic implementations.

Note: Small changes in references.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. Proceedings of COSADE 2014
Keywords
side-channel analysisacquisitionsynchronizationFPGA
Contact author(s)
coflynn @ newae com
History
2014-05-02: revised
2014-03-20: received
See all versions
Short URL
https://ia.cr/2014/204
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/204,
      author = {Colin O'Flynn and Zhizhang (David) Chen},
      title = {{ChipWhisperer}: An Open-Source Platform for Hardware Embedded Security Research},
      howpublished = {Cryptology {ePrint} Archive, Paper 2014/204},
      year = {2014},
      url = {https://eprint.iacr.org/2014/204}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.