Software and hardware side-channel analysis databases for attack on Ascon AEAD
This repository contains datasets collected for side-channel analysis attack on Ascon AEAD.
The repository is divided into two folders, one for software side-channel analysis and one for hardware side-channel analysis:
- cw.zip
- ascon_collect.ipynb : Jupyter Notebook used to collect the traces for the unprotected Ascon implementation
- ascon_protected_collect.ipynb : Jupyter Notebook used to collect the traces for the protected Ascon implementation
- simpleserial-ascon : Ascon firmwares used to collect the traces
- hw.zip
- ascon_g_protected
- test_ascon.py : Script to test the protected Ascon implementation
- collect_lecroy.py : Script to collect traces for unprotected Ascon implementation with Lecroy oscilloscope
- rtl_src : RTL source files for the protected Ascon implementation
- ascon_g_unprotected
- test_ascon.py : Script to test the unprotected Ascon implementation
- collect_lecroy.py : Script to collect traces for unprotected Ascon implementation with Lecroy oscilloscope
- rtl_src : RTL source files for the unprotected Ascon implementation
- helpers.zip
- ASCON.py : Python implementation of Ascon
- SASEBO.py : Helper functions to communicate with the SAKURA-G board
- lecroy3.py : Helper functions for Lecroy oscilloscope
- ascon_helper.py : Helper functions for Ascon
- convert_trs_to_h5.py : Script to convert Trsfile traceset to HDF5 database
ascon_cw_protected.h5 : Side-channel database for software protected Ascon implementation
ascon_cw_unprotected.h5 : Side-channel database for software unprotected Ascon implementation
ascon_hw_protected.h5 : Side-channel database for hardware protected Ascon implementation
ascon_hw_unprotected.h5 : Side-channel database for hardware unprotected Ascon implementation
ascon_cw_protected.trs : Traces for software protected Ascon implementation
ascon_cw_unprotected.trs : Traces for software unprotected Ascon implementation
ascon_hw_protected.trs : Traces for hardware protected Ascon implementation
ascon_hw_unprotected.trs : Traces for hardware unprotected Ascon implementation
Ascon authenticated encryption attack on a Chipwhisperer STM32F4
The dataset was used for side-channel attack on Ascon initialization phase attack of the authenticated encryption mode on a ChipWhisperer STM32F4 target board.
The power traces are collected with the C...