AES: the Substitution Box
One particular part of the AES operation is interesting for a hardware attack. This is the SubBytes operation, where each byte will be substituted with anoth...
One particular part of the AES operation is interesting for a hardware attack. This is the SubBytes operation, where each byte will be substituted with anoth...
In this post, we are going to zoom in on the inner workings of one AES block. AES operates in rounds, which are usually 10, 12 or 14 rounds (matching with AE...
AES (Advanced Encryption Standard) is the NIST-standard for encrypting data and is widely used. AES is a block cipher, which means that the data is encrypted...
Side channels are channels on which information is leaked through the physical properties of the device. These side channels can occur in a more technical se...
The CPU is the computational unit of a computer. It executes a sequence of instructions, which is provided directly or indirectly by the programmer. Instruct...