|
You are here |
doar-e.github.io | ||
| | | | |
goggleheadedhacker.com
|
|
| | | | | This tutorial will show how two methods of implementing the AES algorithm work. It will also demonstrate how to identify these methods in Assembly when reverse engineering an application. | |
| | | | |
blog.0x7d0.dev
|
|
| | | | | The AES algorithm is widely used today, whether it's for encrypting a connection to a website, encrypting data on your hard drive, or storing passwords in your favorite password manager. It has been battle-tested for many decades and is still recommended as one of the most secure algorithms. In this article, I explain how AES encryption works and how the algorithm is implemented. | |
| | | | |
rot256.dev
|
|
| | | | | A walk-through of real-world AES fault injection for dummies on a shoestring budget. Introduction In the post we will setup a microcontroller which encrypts using AES with an unknown key, then explore how to recover the full AES key from simply (randomly) glitching the power-supply which will introduce faults in the arithmetic during the computation of AES encryption. This post is designed to serve as a tutorial and enable the reader to follow along. | |
| | | | |
github.com
|
|
| | | Contribute to riktw/LitexTang9KExperiments development by creating an account on GitHub. | ||