Automated Reverse Engineering of Cryptographic Algorithms

Automated Reverse Engineering of Cryptographic Algorithms

In this article we present a practical case of automated reverse engineering of cryptographic algorithms. We first briefly recall how does our automated solution work. Then we explain step by step how it can be used in a practical case to identify and locate an AES implementation. Finally, we show how the localization results can be exploited by security experts to easily check the correctness of the cryptographic implementation.

more ...