Connaître ses tables 1/2

hardware crypto side channel attacks FCSC 2024 solved on

star

Description

Benoît Blanc thinks he’s managed to hide his AES key in some tables.

He provides you with the code written in C to use them, for example:

$ make
$ ./wb-aes keys.bin < /dev/zero
f34789150f962bdcc56e8c585451f34d

He encrypted the flag using the SHA256 of this key (see output.txt):

def encrypt(k, flag):
    import hashlib
    from Crypto.Cipher import AES
    hk = hashlib.sha256(k).digest()
    E = AES.new(hk, AES.MODE_GCM)
    iv = E.nonce
    c = E.encrypt(flag)
    return {"c": c.hex(), "iv": iv.hex()}

Files

Author

Neige

Flag

Share my success on Fediverse, Twitter, Linkedin, Facebook, or via email.

Submit your solution

You can submit your writeup for this challenge. Read the FAQ to learn how to proceed.

You need to be logged in to submit a writeup.

Writeups

I've been looking for a long time and I still can't find the flag!

You can vote for the solutions you prefer by using the on their respective pages.

DateAuthor Language Tags
2025-04-12
cbothamy
🇫🇷