Credits. Thumbnail credit goes to Quasar! 🎉
vss is an interesting crypto challenge in BalsnCTF, which ended up having 9 solves. I took around 2.5 hours to solve the challenge. This challenge reminds me the yet another PRNG challenge from pbctf 2021 (challenge description, writeup written by @maple3142 and @rkm0959), but with a setting which looked harder. I was pretty surprised that LLL worked, too.
lfsr is another crypto challenge in BalsnCTF with 6 solvers. In the challenge, the output bits are computed nonlinearly from the LFSR states. Given that I knew almost nothing about LFSR, I just came up with the attack by myself… Well, I am not quite a paper guy and I couldn’t read.
vss⌗
Challenge Summary⌗
When connected to the server, two 512-bit numbers x,y will be generated. We are allowed to get up to around 180 sets of (ai,bi,ci,pi,gi,vi,qi) such that:
- ui=(ai+bix+ciy) mod pi, and
- vi=giui mod qi.
The goal is to recover x and y.
Why 180 sets of data? Although not explicitly mentioned in the challenge, there is a 30-second timeout for the remote connection. You can only get around 180 sets of
(ai,bi,ci,pi,gi,vi,qi) within the timeout.
Solution⌗
TL;DR. My approach, like 95% of the crypto challenges I solved, uses LLL.
Part I: Discrete log for the win?⌗
After understanding the challenge statement, I immediately think that we can generate until qi−1 is smooth. In that way, we can easily recover ui from vi,gi and qi using Pohlig-Hellman algorithm. Unfortunately, generating such primes is hard. I generated around 20K sets and none of the qi−1 is 224-smooth (i.e., all the prime factors are not greater than 224).
With that said, finding one such qi is difficult. What makes the situation worse is that we actually need two such qi’s to recover x and y.
Part II: Taking a step backwards⌗
We are forced to give up recovering a full ui because discrete log is difficult. Good that we can still recover part of it. Assume that we know
q−1=r1k1r2k2…rmkms
with r1,r2,…,rm are small primes (for instance, they are all smaller than 224). Denote γ=r1k1r2k2…rmkm and we can recover v:=u mod γ using Pohlig-Hellman. Let’s formulate what we have for now. We have multiple tuples (ai,bi,ci,vi,pi,γi) such that
vi=ai+bix+ciy mod pi mod γi.
If we intend not writing the whole thing using modulo, we will introduce two more unknown, integral variables (si,ti):
vi=ai+bix+ciy−pisi−γiti,
with 0≤ti<pi/γi. If we look at the modular congruence modulo pi, then we have
ai−vi+bix+ciy−γiti≡0 (mod pi).
Suppose that we have 40 sets of (ai,bi,ci,vi,pi,γi) such that γi>232. Assuming each congruence carries 512 bits of information, then we have 512×40=20480 bits of information. We also have 512×2+480×40=20224 bits of unknown because x,y is of 512 bits and each of the ti’s is of 480 bits long. Since we have more information than the unknown, we can apply LLL to solve the system - below is the lattice:
A=⎣⎢⎢⎢⎢⎢⎢⎢⎢⎢⎢⎢⎢⎢⎢⎢⎢⎢⎡a1−v1b1c1−r1−p1a2−v2b2b2−r2−p2………⋱⋱a40−v40b40c40−r40−p4011111⋱1⎦⎥⎥⎥⎥⎥⎥⎥⎥⎥⎥⎥⎥⎥⎥⎥⎥⎥⎤.
The lattice spans the vector v=[00…01xyl1l2…l40] because
[00…01xyl1l2…l40]=[1xyl1l2…l40t1t2…t40]⋅A
v can be found applying LLL if we set appropriate weights. LLL for the win! We can recover x and y and thus the flag: BALSN{commitments_leak_too_much_QwQ}
.
lfsr⌗
Challenge Summary⌗
Note. In the challenge, the operations are done in
GF(2). That said,
+ is actually the
⊕ (XOR) operation and
× is the AND operation.
Let L be a LFSR with key (s0,s1,…,s127), and for i≥0,
si+128=si+si+1+si+2+si+7.
Let the output bits y0,y1,… defined by
yi=si+si+16+si+32+si+120+sisi+8+sisi+32+si+8si+64+si+16si+32+sisi+8si+64+si+16si+32si+64+sisi+8si+16si+64si+120+si+8si+16si+32si+64si+120.
We are given the first 8192 bits of the output (i.e., y0,y1,…,y8191). The goal is to recover the key (i.e., s0,s1,…,s127).
Solution⌗
Part I: Why multiple of eight?⌗
Let yi:=b(si,si+8,si+16,si+32,si+120) for simplicity.
We can see that, for instance, y0, depends on s0,s8,s16,s32,s64 and s120. The indexes of the states are all multiples of eight. Furthermore, this happens on y8i every every integer i:
y8i=b(s8i,s8(i+1),s8(i+2),s8(i+4),s8(i+15)).
We have y0,y8,…,y8×1023. Combining above, we have 1024 equations with 1039 unknowns (the unknowns being s0,s8,…,s8×1038). Therefore, it is expected to get around 215 possible sets of s0,s8,…,s8304 from y0,y8,…,y8184.
Similarly, we can use y1,y9,…,y8185 to recover s1,s9,…,s8305, use y2,y10,…,y8186 to recover s2,s10,…,s8306 and so on.
215 is not an accurate estimate! In average, there are far more than
215 such
si’s from those
yi’s when the number of terms increases. Fortunately the number of
si’s does not affect a lot on the solution.
Now back to the topic. How do we get s0,s8,…,s8(l−1) from y0,y8,…,y8(l−16)? We can perform a search (breadth-first search here):
- Initialize the solution list S with the 215 elements: (0,0,0,…,0), (0,0,0,…,1), …, and (1,1,1,…,1).
- Let s be the first element in the list.
If s has l entries, return S.
- Remove s=(s~0,s~8,…,s~8(k+14)) from S.
For each s~8(k+15)∈{0,1}, if y8k=b(s~8k,s~8(k+1),s~8(k+2),s~8(k+4),s~8(k+15)), append (s~0,s~8,…,s~8(k+14),s~8(k+15)) to S.
- Go back to step 2.
We know (s0,s8,…,s8(l−1))∈S because all the below equations hold:
⎩⎪⎪⎪⎪⎪⎪⎨⎪⎪⎪⎪⎪⎪⎧y0y8y8(l−16)=b(s0,s8,s16,s32,s120)=b(s8,s16,s24,s40,s128)⋮=b(s8(l−16),s8(l−15),s8(l−14),s8(l−12),s8(l−1)).
Regarding the notation. I use
s~i’s instead of
si’s because they are not necessary the correct ones.
Part II: How to get the key from undecillions of si’s?⌗
Why undecillions? Suppose that we have
215 sets of
s0,s8,…,
215 sets of
s1,s9,… and so on. There are
215×8≈1036 sets of
s0,s1,s2,… in total.
Let’s use the above algorithm to find these four sets of numbers:
- (s~0,s~8,…,s~504,s~512,…,s~632)∈S0 (80 terms),
- (s~1,s~9,…,s~505)∈S1 (64 terms),
- (s~2,s~10,…,s~506)∈S2 (64 terms), and
- (s~7,s~15,…,s~511)∈S7 (64 terms).
8192 bits? I don’t need that. The challenge can be solved 513 consecutive bits, ideally, with my approach.
Recall the state transition: si+128=si+si+1+si+2+si+7 for all integer i≥0. Let’s define a set T0 (transformed from S0) by:
T0={(s~0+s~128,s~8+s~136,…,s~504+s~632)∈{0,1}64 ∣ (s~0,s~8,…,s~632∈S0)}
We can see that
⎩⎪⎪⎪⎪⎪⎨⎪⎪⎪⎪⎪⎧t0:=(s0+s128,s8+s136,…,s504+s632)∈T0s1:=(s1,s9,…,s505)∈S1s2:=(s2,s10,…,s506)∈S2s7:=(s7,s15,…,s511)∈S7,
and eventually t0+s1+s2+s7=(0,0,…,0).
We can precompute every t~0,i+s~1,j∈{0,1}64, where t~0,i∈T0 and s~1,j∈S1, and store all of them in the set L. After that, we can check if there exists i,j such that
t~0,i+s~1,j=s~2,k+s~7,l,
for all s~2,k∈S2 and s~7,l∈S7. If that is the case (which is very rare!), we can try to recover s0,s1,…,s127 and see if it generates the same output bits as given. After the key is recovered, then we can recover the flag: BALSN{almost_linear_too_easy}
.