skip to Main Content

RP2350 Hacking Challenge 2: Less randomisation, more correlation

February 3, 20263 minute read

 [[{“value”:”

At the end of July 2025 — so almost 6 months ago — we launched the second RP2350 Hacking Challenge, searching for practical side-channel attacks on the power-hardened AES implementation underpinning RP2350‘s secure boot. So far, we don’t have a winner, so we decided to evolve the challenge by removing one of the core defense-in-depth features: the randomisation of memory accesses.

Our AES implementation was designed to withstand side-channel attacks by using multi-way secret sharing (where sensitive values are split into random components that must be XORed together) and by randomly permuting the order of operations and data. We hope that even just the multi-way shares are enough to protect us against side-channel attacks; hence, we have decided to update our challenge:

If you manage to demonstrate a successful attack on our AES implementation without the randomisation, you win!

For this, we have created a new version of the challenge in the Hacking Challenge 2 GitHub repository. You will notice the new aes_no_random.S, which disables all RNG-based randomisation.

We’ve also added a Unicorn-based emulation example to help you develop attacks virtually!

I didn’t understand any of this?!

The secure boot protection of firmware on RP2350 relies on AES — the Advanced Encryption Standard — to decrypt the firmware from external flash into the on-chip SRAM. AES in itself is considered very secure; however, a lot of software and hardware implementations are susceptible to so-called side-channel attacks. By recording and analysing hundreds of thousands (or even millions) of power traces on the chip, attackers might be able to recover the encryption key.

To protect against this, we worked with some very smart folks to build an AES implementation that is hardened against these kinds of attacks. Now we are putting it to the test by offering a bounty to the first person who successfully manages to attack our AES via side channels!

I’m almost there…

Getting close but don’t have a successful attack yet? Write to us! We care more about protecting our implementation than about having a full end-to-end attack. If you’ve identified a leak, we want to talk to you!

What we know so far

During our initial work on the AES implementation, we found some abstract correlation that lets us differentiate between an all-zeros key and an all-ones key. However, we were unable to build a model that significantly impacts the key space.

A bit more time on the clock

To give you a little more time to keep hacking, we’re extending the deadline to 30 April 2026. The prize remains unchanged at $20,000.

Head to the Hacking Challenge 2 repo to view the updated challenge software.

The post RP2350 Hacking Challenge 2: Less randomisation, more correlation appeared first on Raspberry Pi.

“}]] 

Web Developer, Web Design, Web Builder, Project Manager, Business Analyst, .Net Developer

No Comments

This Post Has 0 Comments

Leave a Reply

Back To Top