<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.sha2017.org/index.php?action=history&amp;feed=atom&amp;title=Session%3ACheap_SCA_with_Open_Source_tools</id>
		<title>Session:Cheap SCA with Open Source tools - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.sha2017.org/index.php?action=history&amp;feed=atom&amp;title=Session%3ACheap_SCA_with_Open_Source_tools"/>
		<link rel="alternate" type="text/html" href="https://wiki.sha2017.org/index.php?title=Session:Cheap_SCA_with_Open_Source_tools&amp;action=history"/>
		<updated>2026-04-26T08:13:59Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.3</generator>

	<entry>
		<id>https://wiki.sha2017.org/index.php?title=Session:Cheap_SCA_with_Open_Source_tools&amp;diff=10576&amp;oldid=prev</id>
		<title>Lukasz.chmielewski: Learn SCA with open source tools &amp; cheap equpiment from experts!</title>
		<link rel="alternate" type="text/html" href="https://wiki.sha2017.org/index.php?title=Session:Cheap_SCA_with_Open_Source_tools&amp;diff=10576&amp;oldid=prev"/>
				<updated>2017-08-05T11:49:26Z</updated>
		
		<summary type="html">&lt;p&gt;Learn SCA with open source tools &amp;amp; cheap equpiment from experts!&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Session&lt;br /&gt;
|Has session tag=sca, open source, cheap&lt;br /&gt;
|Is for kids=No&lt;br /&gt;
|Has description=During this workshop in the Riscufefe village, security analysts from Riscure will show how Side Channel Analysis techniques work (DPA) with super cheap equipment (less than 60 euro the full setup) and Open Source SCA tools (jlSCA).&lt;br /&gt;
&lt;br /&gt;
IMPORTANT: You will get a VM which you can practice what you learned; please bring your own laptop with &amp;gt;15GB of free disk space and VirtualBox installed (with extension package)!!&lt;br /&gt;
|Has website=www.riscure.com/training&lt;br /&gt;
|Has session type=Workshop&lt;br /&gt;
|Has session keywords=hardware, software, embedded, hacking, security&lt;br /&gt;
|Processed by village=Village:Riscufefe&lt;br /&gt;
|Held in language=en - English&lt;br /&gt;
|Has orga contact=boixcarpi@riscure.com&lt;br /&gt;
}}&lt;br /&gt;
{{Event&lt;br /&gt;
|Has subtitle=Saturday edition&lt;br /&gt;
|Has start time=2017/08/04&lt;br /&gt;
|Has duration=90&lt;br /&gt;
|Has session location=Village:Riscufefe&lt;br /&gt;
}}&lt;br /&gt;
{{Event&lt;br /&gt;
|Has subtitle=Sunday edition&lt;br /&gt;
|Has start time=2017/08/04&lt;br /&gt;
|Has duration=90&lt;br /&gt;
|Has session location=Village:Riscufefe&lt;br /&gt;
}}&lt;br /&gt;
Workshop description &lt;br /&gt;
(Important: bring your own laptop with Virtualbox and 15GB free disk space!)&lt;br /&gt;
&lt;br /&gt;
Implementing security on embedded systems can be a difficult task. This is especially true when you write your own implementation of a crypto algorithm (either public or your own). During this workshop we perform attacks on cryptographic functions (encryption with AES, if time maybe signatures with ECDSA) using the popular Riscure HackMe platform. &amp;quot;We perform attacks&amp;quot; in this context means you, as all the exercises are hands-on! You will learn that the requirements for executing some of the attacks (e.g. cost of hardware required for SCA) are much less than you thought, and if with the right knowledge they can be straightforward. Don't worry: we will have a theoretical introduction to the attacks, but in an easy to grasp format.&lt;br /&gt;
&lt;br /&gt;
For the exercises we will use a real device (the RHme board, based on an Arduino Nano board) and the challenges available on the RHme2 contest so that you can perform these attacks with your own laptop. Note that we will change the flags of the challenges, so that you can enjoy them if you attempted/solved some of them. We will also provide a Virtual Machine already pre-configured so you will be good to go from the start of the workshop. And after the workshop, if you liked these attacks, you have the chance to practice your skills with the board with the publicly available challenges for the board.&lt;br /&gt;
&lt;br /&gt;
Proposed workshop program&lt;br /&gt;
Intro to workshop and bootstrap laptops/embedded boards for the exercises&lt;br /&gt;
&lt;br /&gt;
Side Channel Analysis on private key encryption (AES) challenge&lt;br /&gt;
- Theory&lt;br /&gt;
- Exercise: Piece of SCAke&lt;br /&gt;
&lt;br /&gt;
If time: public Key signature (ECDSA) challenge&lt;br /&gt;
- Theory&lt;br /&gt;
- Exercise: Secure Filesystem v1.92r1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Should I attend this workshop or not?&lt;br /&gt;
&lt;br /&gt;
You should attend if:&lt;br /&gt;
- You have little to zero practical experience on doing hands-on attacks on crypto/security implementations&lt;br /&gt;
- You think that performing implementation attacks on cryptography require very specialized tooling&lt;br /&gt;
- You enjoy participating in CTF-like contests&lt;br /&gt;
- You heard of terms like SCA, DPA, ECDSA or timing attacks but have never done them yourself&lt;br /&gt;
&lt;br /&gt;
You should not attend if:&lt;br /&gt;
- Terms like SCA, DPA, ECDSA, timing attacks have no mystery for you, and you know how to perform them&lt;br /&gt;
- You are not interested in practical attacks on cryptography&lt;br /&gt;
- You participated in the RHme contest and you beat all these challenges&lt;/div&gt;</summary>
		<author><name>Lukasz.chmielewski</name></author>	</entry>

	</feed>