Python Elliptic Curve cryptography Side-Channel Analysis toolkit.
Notebook package, see below for description of the notebooks showcasing the toolkit. See the main repo for more information.
The configuration space notebook explores the size of the space of possible implementation configurations of ECC.
The simulation notebook showcases the simulation and execution tracing capabilities of the toolkit.
The codegen notebook demonstrates the process of generating and interacting with generated C implementations of ECC for micro-controllers. The generated implementations can either be run on compatible hardware or emulated (at CPU-level) using the Rainbow-based emulator demonstrated in the emulator notebook.
The measurement notebook demonstrates the trace acquisition using PicoScope/ChipWhisperer scopes that can be used with the toolkit.
The visualization notebook showcases the trace visualization capabilities of the toolkit.
The smartcards notebook shows the options of communicating with smartcard targets using the toolkit.
The RPA notebook uses the Refined Power Analysis attack-based technique to reverse-engineer the scalar multiplier of ECC implementations, given access to a power side-channel.
The EPA notebook uses the ideas behind the Exceptional Procedure Attack to reverse-engineer the coordinate system and formulas of ECC implementations, given access to an error side-channel.
The ZVP notebook uses the Zero-Value Point attack-based technique to reverse-engineer the coordinate system and formulas of ECC implementations, given access to a power side-channel.
The structural notebook explores the structure of scalar multiplers and addition formulas for reverse-engineering purposes.
MIT License
Copyright (c) 2018-2023 Jan Jancar
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
Development is supported by the Masaryk University grant MUNI/C/1701/2018, this support is very appreciated.