SCHaiku

hardware side channel attacks FCSC 2021 solved on

star star star

Description

An embedded device, a tablet, that has a secure exchange system with a data server has just been analyzed by one of our interns on side channels.

To authenticate the server, a challenge-response system is implemented as defense-in-depth. More specifically, this step goes as follows. The server sends a challenge P (a random 128-bit plaintext) to the tablet. The tablet computes a ciphertext C from P and a secret key K (shared between the tablet and the server) with:

C = AES128-ECB(K, P)

and then sends C to the server to authenticate itself. (The same steps are performed in the other direction to reach mutual authentication).

In parallel to the encryption, the tablet displays an image on its screen. Our colleague noticed that interference appeared on some part of the image during this computation.

Can you find the key from these potential information leaks?

To do so, he has prepared an animated PNG (SCHaiku.png) showing the reference image and those corresponding to different encryptions. The ordered list of challenges corresponding to each of the parasitized images is also given (challenges.txt).

Additional information: the display is done using elementary blocks of 4 pixels. The synchronization between the display of the elementary blocks and the cryptographic computation is not perfect: the only thing we can be sure of is that the interference only occurs on exactly one pixel among the 4 in a block.

The flag is obtained by finding the challenge corresponding to this ciphertext sent by the server: d048821b99bca6758115e7a403bff427.

Files

  • challenges.txt
    6.31 KiB – f8628b56def50cc5338812c4c4d74df1bc12aa24c302ca8430f2c48e4b856325
  • SCHaiku.png
    805.06 KiB – c3e29686e04bb29475446baf068ee8383f2f471c42bd083e6157121fb01b5466

Author

Guena

Flag

Share my success on Fediverse, Twitter, Linkedin, Facebook, or via email.

Submit your solution

You can submit your writeup for this challenge. Read the FAQ to learn how to proceed.

You need to be logged in to submit a writeup.

Writeups

There are no public solutions for this challenge yet, but you can submit yours after getting the flag.