I hope the RPI folks test-attack their AES implementation first
Google "Cortex-M33 AES differential power analysis" and you'd get plenty of material. I just browsed two papers describing successful attacks against AES accelerators in an NXP LPC and a Microchip SAML11.
So RPi want the security horde to attack a hardened software AES implementation... question is, how much can you harden AES in software? Successful attacks happen; it's just that such things are hardly covered in mainstream news or mainstream tech news.
Google "Cortex-M33 AES differential power analysis" and you'd get plenty of material. I just browsed two papers describing successful attacks against AES accelerators in an NXP LPC and a Microchip SAML11.
So RPi want the security horde to attack a hardened software AES implementation... question is, how much can you harden AES in software? Successful attacks happen; it's just that such things are hardly covered in mainstream news or mainstream tech news.
Statistics: Posted by katak255 — Mon Feb 10, 2025 11:21 am