Connaître ses tables 1/2

hardware crypto side channel attacks FCSC 2024 solved on

star

Description

Benoît Blanc thinks he’s managed to hide his AES key in some tables.

He provides you with the code written in C to use them, for example:

$ make
$ ./wb-aes keys.bin < /dev/zero
f34789150f962bdcc56e8c585451f34d

He encrypted the flag using the SHA256 of this key (see output.txt):

def encrypt(k, flag):
    import hashlib
    from Crypto.Cipher import AES
    hk = hashlib.sha256(k).digest()
    E = AES.new(hk, AES.MODE_GCM)
    iv = E.nonce
    c = E.encrypt(flag)
    return {"c": c.hex(), "iv": iv.hex()}

Files

Author

Neige

Flag

Share my success on Fediverse, Twitter, Linkedin, Facebook, or via email.

Submit your solution

You can submit your writeup for this challenge. Read the FAQ to learn how to proceed.

You need to be logged in to submit a writeup.

Writeups

There are no public solutions for this challenge yet, but you can submit yours after getting the flag.