This is the code that exemplifies the attack described in "Recovering the CTR_DRBG state in 256 traces": https://tches.iacr.org/index.php/TCHES/article/view/8392
For information about JuPyter Notebooks: see https://jupyter.org
The code allows to choose between different devices for the traces.
- CORTEX : traces from a Cortex M4, using the ChipWhisperer Lite board with STM32F3 target mounted on UFO board
- DUINO : traces from Arduino Uno device (The traces are too large to upload on Github, but can be sent to you by request)
- XMEGA : traces from the built-in XMEGA on the ChipWhisperer Lite board
Any questions can be sent to lauren.demeyer@esat.kuleuven.be