ChipWhisperer Side-Channel Analysis Tool
ChipWhisperer is an open source toolchain dedicated to hardware security research. This toolchain consists of several layers of open source components:
- Hardware: The ChipWhisperer uses a capture board and a target board. Schematics and PCB layouts for the ChipWhisperer-Lite capture board and a number of target boards are freely available.
- Firmware: Three separate pieces of firmware are used on the ChipWhisperer hardware. The capture board has a USB controller (in C) and an FPGA for high-speed captures (in Verilog) with open-source firmware. Also, the target device has its own firmware; this repository includes many firmware examples for different targets.
- Software: The ChipWhisperer software includes a Python API for talking to ChipWhisperer hardware (ChipWhisperer Capture) and a Python API for processing power traces from ChipWhisperer hardware (ChipWhisperer Analyzer). You can find documentation for our Python API at chipwhisperer.readthedocs.io
First time using ChipWhisperer? Check out these links:
- Getting started
- Installing ChipWhisperer if you're trying to set up this software package
- Hardware Docs for hardware information. Also has helpful comparison between different NewAE products.
ChipWhisperer 5.5: All-in-one installer, Serial Port, ECC, and Segmented Capture
ChipWhisperer 5.5 has brought some exciting new features that make it easier to use and allow you to do some cool new things:
- The ChipWhisperer Windows installer now includes everything you need to use ChipWhisperer, including Python/Juptyer, Git, Make, and compilers! For more information, check out our Windows installer page on ReadTheDocs.
- ChipWhisperer capture devices (CWLite, Nano, Pro, etc.) have gotten a new firmware update that gives them a USB-CDC serial port for talking over USART. This means you can use your favourite serial program, such as PuTTy, to talk to and listen to the target's USART communication. For more info, see our rtfm serial port page.
- We've recently added two ECC power analysis attack notebooks. One attacks a hardware ECC implementation running on the CW305
and the other attacks a software ECC implementation running on a microcontroller. Both can be found in
- There's a new segmented capture mode that allows you to fill the ChipWhisperer capture buffer with multiple power traces before transferring data to the PC. This greatly reduces the overhead on trace transfer, allowing capture speeds of 1000+ captures/second for FPGA AES implementations. See our API documentation to see how to use it.
Also, if you haven't checked it out yet, ChipWhisperer 5.4 included TraceWhisperer, which allows you to use Arm trace to timestamp microcontroller operations/functions in your powertrace. It requires a CW305 or PhyWhisperer. For more information, see https://github.com/newaetech/DesignStartTrace.
Note all development occurs on the develop branch. If you are looking for bleeding edge it's NOT on master - we push each release (and possibly any critical changes) to master. This means that "master" always gives you the latest known-working branch, but there may be new features on the "develop" branch.
Stuck? If you need a hand, there are a few places you can ask for help:
- The NewAE Forum is full of helpful people that can point you in the right direction
- If you find a bug, let us know through the issue tracker
ChipWhisperer is a trademark of NewAE Technology Inc., registered in the US, Europe, and China.
Release history Release notifications | RSS feed
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
|Filename, size||File type||Python version||Upload date||Hashes|
|Filename, size chipwhisperer-5.5.2.tar.gz (3.2 MB)||File type Source||Python version None||Upload date||Hashes View|