Introduction
The Cracknuts project aims to provide users with a "professional, easy-to-use, open-source" chip security analysis solution. It enables power analysis and electromagnetic analysis on various target chips, and can perform clock glitching and voltage glitching fault injection attacks. All software and hardware code of the project will be open-sourced, facilitating user customization and integration.
Components
The project consists of three parts: the CrackNuts
analysis software, the Cracker
testing device, and the Nuts
test targets.
CrackNuts
usesJupyter
as the development environment.- Supports device and waveform display interface
- Provides convenient and easy-to-use API interfaces
- Cross-platform:
Windows
,Linux
,Mac
Cracker
includes a series of testing devices, capable of analyzing the security of variousNuts
Cracker-S1
: Primarily used for side-channel analysisCracker-G1
: Primarily used for fault analysis (under development)Cracker-F1
: Primarily used for hardware design side-channel security verification (under development)- More testing devices will be developed based on user requirements ...
Nuts
includes a series of target chips (custom development available upon user request)Nut-stm32f103
Nut-stm32f4
- More test devices will be developed based on user requirements ...
Deployment
All Cracker
devices support POE
(Power over Ethernet) operation, offering the following advantages:
- Greatly simplifies deployment—only one network cable is required for both power supply and communication
- Breaks physical distance limitations, enabling remote testing
- Facilitates networking, allowing simultaneous control of multiple testing devices