Breaking AES with an Oscilloscope
AES is a powerful encryption algorithm that protects some our most important secrets. But did you know that many devices are inadvertently leaking the value of their private key through their power pins?! Join me in this special preview of my upcoming workshop at the Embedded Systems Summit (14-16 October 2025 in San Jose, CA) as we explore the world of hardware security and discover just how easy it could be to break AES encryption with only an oscilloscope and some math.
Summary
This blog previews a hands-on workshop showing how AES implementations can leak secret keys through power side-channels and how an ordinary oscilloscope plus basic math can recover them. Readers will see practical demonstrations of trace acquisition, simple signal processing, and attack workflows used to break AES on real embedded devices.
Key Takeaways
- Capture power traces from a microcontroller using an oscilloscope and minimal probe setup
- Apply basic signal processing and correlation techniques to extract AES key bytes from measured traces
- Identify common implementation mistakes that enable power-based side-channel leakage
- Implement and evaluate practical countermeasures and testing methods to reduce leakage
Who Should Read This
Embedded firmware engineers, security researchers, and IoT device developers with an interest in hardware Safety/Security who want to learn practical side-channel testing and defenses.
Still RelevantAdvanced
Related Documents
- Consistent Overhead Byte Stuffing TimelessIntermediate
- PID Without a PhD TimelessIntermediate
- Introduction to Embedded Systems - A Cyber-Physical Systems Approach Still RelevantIntermediate
- Can an RTOS be really real-time? TimelessAdvanced
- Memory Mapped I/O in C TimelessIntermediate








