Skip to content

Latest commit

 

History

History
 
 

ATMEGA_AES_v1

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 

The ASCADv1 database

This sub-repository is associated with the article "Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database" available on the eprints.

Databases, Neural Networks models as well as scripts are provided here as a complementary material to the article: please refer to it for various explanations and details about SCA and Deep Learning.

Authors

Acknowledgements

This work has been partially funded through the H2020 project REASSURE.

The ATMega8515 SCA campaigns

ANSSI has provided source code implementations of two masked AES on the ATMega8515 MCU target, which can be found on the following github repository: ANSSI-FR/secAES-ATmega8515. ATMega8515 uses external clocking: the acquisitions have been performed using a smart card reader providing a 4 MHz clock, compatible with the ISO7816-3 standard default values.

These ASCAD databases correspond to the first version (v1) of the masked AES (the second version has improved security and is available here). The v1 implementation allowed us to perform the acquisition of Power consumptions measurements in traces of 100,000 time samples (at 2 giga-samples per second) on an ATMega8515 based WB Electronics 64 Kbit ATMega chipcard (see the secAES-ATmega8515 material for more information). No specific hardware countermeasure has been activated on the ATMega8515.

Two campaigns are available in the current sub-folders. The first campaign corresponds to a setting where the key is fixed for all measurements, and the second campaign corresponds to a setting where the key is variable for 66% of the measurements (it is fixed for the remaining 33% which allows for the building of an attack/testing database). More information can be found in the sub-folders.

Instructions to download the databases are available in the corresponding sub-folders: