From fa9034f78b0d31ca472037c4e9f0f6cca94429a4 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Caroline=20Sandsbr=C3=A5ten?= Date: Fri, 12 Sep 2025 10:59:28 +0200 Subject: [PATCH] remove old jupyter readme --- jupyter/README.md | 37 ------------------- jupyter/lab/README.md | 84 ------------------------------------------- 2 files changed, 121 deletions(-) delete mode 100644 jupyter/README.md delete mode 100644 jupyter/lab/README.md diff --git a/jupyter/README.md b/jupyter/README.md deleted file mode 100644 index 065c2d65..00000000 --- a/jupyter/README.md +++ /dev/null @@ -1,37 +0,0 @@ -# ChipWhisperer Jupyter Notebook Repository - -Welcome to the ultimate collection of ChipWhisperer Jupyter notebooks. - - -## Repo Contents - -This repository serves multiple purposes: -* Courses (see `courses`) in Side-Channel Analysis (SCA) along with Fault Injection. These are organized to align with commercial course content on [ChipWhisperer.io](https://www.ChipWhisperer.io), but many are stand-alone and can serve as a self-taught course. - * Course notebooks are open-source and you can follow along at your own pace too! - * See [ChipWhisperer.io](https://www.ChipWhisperer.io) for more details. -* Experiments (see `experiments`) showcasing various things you can do with the ChipWhisperer platform. These notebooks may have less background, often require certain hardware to perform the experiments, and may be in a work in progress state. -* Demos (see `demos`) of various features and targets, such as ChipWhisperer-Pro streaming mode being used to capture long power traces, or hardware AES running on the CW305 FPGA board. -* Many notebooks have been overhauled and renamed - if you're looking for the previous version, see the `archive` directory (preserved here to keep links less broken on the internet). - - -## Getting Started - -First time using ChipWhisperer? Check out these links: -* [ChipWhisperer Documentation](https://chipwhisperer.readthedocs.io/en/latest/index.html): including background on ChipWhisperer, how to run the Jupyter server, and how to install ChipWhisperer. -* `0 - Introduction to Jupyter Notebooks.ipynb` and `1 - Connecting to Hardware.ipynb` also serve as introductions to interacting with Jupyter Notebooks and the ChipWhisperer hardware. - -## Getting Support - -Having trouble? Here are some quick ways to get help: -* If you have a general question or problem, please head over to [forum.newae.com](https://forum.newae.com) which is our primary support method. -* If you've found a specific bug, please raise a GITHub issue. -* If you want more hands-on help, part of our training offerings on [ChipWhisperer.io](https://ChipWhisperer.io) offer more interactive help (including a private forum section). - - -## Re-Use in Teaching & Academic Environments - -These notebooks are distributed under the open-source GPL license (as is the rest of ChipWhisperer). This means you can distribute and modify this material (even for commercial trainings), **provided you maintain references to this repository and the original authors, and also offer your derived material under the same conditions**. - -If you would like to re-use this content commercially under different license conditions, please contact `sales -AT- newae.com`. Note that as a public project, we also have user-contributed content which we may not own the original copyright for. - -This material is Copyright (C) NewAE Technology Inc., 2015-2020. ChipWhisperer is a trademark of NewAE Technology Inc., claimed in all jurisdictions, and registered in at least the United States of America, European Union, and Peoples Republic of China. diff --git a/jupyter/lab/README.md b/jupyter/lab/README.md deleted file mode 100644 index c593fe6b..00000000 --- a/jupyter/lab/README.md +++ /dev/null @@ -1,84 +0,0 @@ - -## Courses - -### SCA101: Introduction to Power Analysis Attacks - -* **Lab 2-1A**: Instruction Power Differences -* **Lab 2-1B**: Power Analysis for Password Bypass -* **Lab 3-1**: Large hamming Weight Swings -* **Lab 3-2**: Recovering an AES Key from a Single Bit -* **Lab 3-3**: Recovery an AES key from a Power measurement (DPA) -* **Lab 4-1**: Showing the Hamming Weight relationship of data & power. -* **Lab 4-2**: Correlation Power Analysis -* **Lab 4-3**: Using ChipWhisperer for CPA Attacks -* **Lab 5-1**: ChipWhisperer CPA Attacks in Practice -* **Lab 6-4**: Triggering on UART - -### SCA201: Power Analysis Attacks on AES Implementations -* **Lab 1-1A**: Resynchornizing Traces with Sum of Absolute Differences -* **Lab 1-1B**: Resynchornizing Traces with Dynamtic Time Warp -* **Lab 2-1**: CPA on a 32-bit AES Implementation -* **Lab 2-2**: CPA on a Hardware AES Implementation: Last-Round State -* **Lab 2-3**: CPA on a Hardware AES Implementation: Mix-Columns -* **Lab 3-1A**: AES-256 Bootloader Attack -* **Lab 3-B**: AES-256 Bootloader with Reverse Engineering using Power Analysis - -### SCA202: Power Analysis on Asymmetric Implementations -* Power Analysis on 8-bit RSA Implementation (OLD VERSION IN REPO NOW) -* Power Analysis on MBED-TLS RSA Implementation (NOT IN REPO YET) -* Power Analysis on software ECC Implementation (NOT IN REPO YET) - -### SCA203: Leakage Assesement -**NOTE: These labs are not here yet - but material is in the repo for some of this in sca203 folder** -* Introduction to Leakage Assessment -* Non-Specific TVLA on AES -* Specific TVLA on AES -* TVLA for Reverse Engineering -* TVLA on ECC - -### SCA204: Power Analysis on Hardware ECC -* **Part 1**: Introduction to Hardware ECC Attacks -* **Part 2**: Improving the Attack -* **Part 3**: Countermeasures -* **Part 4**: More Countermeasures and Unintended Consequences -* **Part 5**: TVLA - -### SCA205: Power Analysis on Software ECC -* **Part 1**: Breaking software ECC with TraceWhisperer -* **Part 2**: Breaking software ECC without TraceWhisperer -* **Part 3**: Breaking software ECC with TraceWhisperer *and* SAD - -### FAULT101 -* **Lab 1-1**: Introduction to Clock Glitching -* **Lab 1-2**: Clock Glitching to Bypass Password -* **Lab 1-3**: Clock Glitching to Dump Memory -* **Lab 1-4**: Authentication Bypass on AES Bootloader -* **Lab 2-1**: Introduction to Voltage Glitching -* **Lab 2-2**: Voltage Glitching to Bypass Password -* **Lab 2-3**: Voltage Glitching to Dump Memory - -### FAULT201 -* **Lab 1-1A**: Introduction to AES Fault Attacks -* **Lab 1-1B**: AES Loop Skip Fault Attack -* **Lab 1-2**: 1.5 Round AES Fault Attack -* **Lab 1-3A**: DFA Attack Against Final MixColumns -* **Lab 1-3B**: DFA Attack on AES -* **Lab 2-1**: Fault Attack on RSA - - -## Naming Notes - -### Prefix - -sca: Side Channel (Power) Analysis courses -fault: Fault Injection (Glitching) courses - -### Numbering - -* 1xx: Fundamentals. A 101 course is a prerequisite for all higher course. -* 2xx: Advanced topics. Dependencies noted in the labs/courses themselves. -* appx: Applications. Dependencies noted in the labs/courses themselves. - -### Getting Started - -We recommend going through sca101 before fault101, at least Lab 1_X and Lab 2_X. This will introduce you to the required ChipWhisperer software.