Skip to main content
Version: 0.19.0

Introduction

The Cracknuts project aims to provide users with a "professional, easy-to-use, open-source" chip security analysis solution. It enables power analysis and electromagnetic analysis on various target chips, and can perform clock glitching and voltage glitching fault injection attacks. All software and hardware code of the project will be open-sourced, facilitating user customization and integration.

Components

The project consists of three parts: the CrackNuts analysis software, the Cracker testing device, and the Nuts test targets.

image-20241205000500363

  • CrackNuts uses Jupyter as the development environment.
    • Supports device and waveform display interface
    • Provides convenient and easy-to-use API interfaces
    • Cross-platform: Windows, Linux, Mac
  • Cracker includes a series of testing devices, capable of analyzing the security of various Nuts
    • Cracker-S1: Primarily used for side-channel analysis
    • Cracker-G1: Primarily used for fault analysis (under development)
    • Cracker-F1: Primarily used for hardware design side-channel security verification (under development)
    • More testing devices will be developed based on user requirements ...
  • Nuts includes a series of target chips (custom development available upon user request)
    • Nut-stm32f103
    • Nut-stm32f4
    • More test devices will be developed based on user requirements ...

Deployment

All Cracker devices support POE (Power over Ethernet) operation, offering the following advantages:

  1. Greatly simplifies deployment—only one network cable is required for both power supply and communication
  2. Breaks physical distance limitations, enabling remote testing
  3. Facilitates networking, allowing simultaneous control of multiple testing devices

image-20241205215428118