CHES Challenge 2025
  • Overview
  • Getting Started
  • Targets
  • Datasets
  • Submission
  • Challenge Rule
  • FAQ
  • Leaderboard
Powered by GitBook
On this page

Targets

PreviousGetting StartedNextDatasets

Last updated 2 days ago

The target device is the Raspberry Pi 4B board with a Broadcom BCM2711 SoC. This is the same as the target used in [1]. It features a quad-core out-of-order ARM Cortex-A72 (ARMv8, 64-bit) processor, operating at a maximum frequency of 1.8 GHz. This device lacks hardware support for AES. It runs on the Bullseye version of the Raspberry Pi OS (Debian Linux). We execute a C-based unprotected implementation of AES-128 for our experiments without computer optimisations. The considered target is the first round of AES after the AddRoundKey.

References

Harishma Boyapally, Dirmanto Jap, Qianmei Wu, Fan Zhang, and Shivam Bhasin. Reality check on side-channels: Lessons learnt from breaking AES on an ARM cortex a processor. Cryptology ePrint Archive, Paper 2024/1381, 2024. (accepted in WOOT'25)

https://eprint.iacr.org/2024/1381