+ All Categories
Home > Documents > CHES 2015 Challenge - cryptoexperts.com · CHES 2015 Challenge Adrian Thillard, Ryad Benadjila,...

CHES 2015 Challenge - cryptoexperts.com · CHES 2015 Challenge Adrian Thillard, Ryad Benadjila,...

Date post: 16-Feb-2019
Category:
Upload: nguyennga
View: 216 times
Download: 0 times
Share this document with a friend
45
CHES 2015 Challenge Adrian Thillard, Ryad Benadjila, Emmanuel Prouff, Gu´ ena¨ el Renault, Matthieu Rivain CHES 2015 – Tuesday, September 15th, St-Malo, France 1/39 A. Thillard, R. Benadjila CHES15 Challenge
Transcript

CHES 2015 Challenge

Adrian Thillard, Ryad Benadjila, Emmanuel Prouff, GuenaelRenault, Matthieu Rivain

CHES 2015 – Tuesday, September 15th, St-Malo, France

1/39 A. Thillard, R. Benadjila CHES15 Challenge

CHES Challenge : goal

Challenge people on CHES topics

Add fun to the conference

2/39 A. Thillard, R. Benadjila CHES15 Challenge

CHES Challenge : general principle

1 Download 4 challenges

2 Solve their problem to retrieve flags

3 Enter flags on our website to earn points

4 ? ? ?

5 PROFIT

3/39 A. Thillard, R. Benadjila CHES15 Challenge

Stats

250 registrations

44 retrieved at least one flag

First to retrieve all the flags : 6 days - yobibeI Check his awesome writeup 1 ! !

8 players retrieved all the flags

1. http://wiki.yobi.be/wiki/CHES2015_Writeup

4/39 A. Thillard, R. Benadjila CHES15 Challenge

Winners (1/2)

1 hellman

2 yobibe (represented by Joppe BOS)

3 jybu (represented by Francois DASSANCE)

4 fox (represented by Ilya KIZHVATOV)

5/39 A. Thillard, R. Benadjila CHES15 Challenge

Winners (1/2)

1 hellman

2 yobibe (represented by Joppe BOS)

3 jybu (represented by Francois DASSANCE)

4 fox (represented by Ilya KIZHVATOV)

5/39 A. Thillard, R. Benadjila CHES15 Challenge

Winners (1/2)

1 hellman

2 yobibe (represented by Joppe BOS)

3 jybu (represented by Francois DASSANCE)

4 fox (represented by Ilya KIZHVATOV)

5/39 A. Thillard, R. Benadjila CHES15 Challenge

Winners (1/2)

1 hellman

2 yobibe (represented by Joppe BOS)

3 jybu (represented by Francois DASSANCE)

4 fox (represented by Ilya KIZHVATOV)

5/39 A. Thillard, R. Benadjila CHES15 Challenge

Winners (2/2)

5 c23 (represented by Cyril ROSCIAN)

6 Seeluna (Celine THUILLET)

7 barbapapa (represented by Julien FRANCQ)

8 OverTime (represented by Alberto BATTISTELLO)

9 dummy (represented by Peter SHWABE)

10 marsob

6/39 A. Thillard, R. Benadjila CHES15 Challenge

CHES Challenge : description

1 WAV file : signal analysis, SCA

2 JPG file : fun (stegano, chess, googling)

3 C file : factorisation, primes collision, SCA, fault attacks

4 PNG file : pattern matching, emulation, padding oracle,whitebox

7/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 1- WAV file

8/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 1- WAV file : First flag

Quicken the file =⇒ voice reading letters

Letters form sentences =⇒ solving recipe

9/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 1- WAV file : First flag is in the spectrogram

Go on pastebin =⇒ first flag and plaintexts1

1. Note to self : do not screw with the plaintexts

10/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 1- WAV file : First flag is in the spectrogram

Go on pastebin =⇒ first flag and plaintexts1

1. Note to self : do not screw with the plaintexts

10/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 1- WAV file : Second flag : Getting the curves

Recipe instructed to extract needles

11/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 1- WAV file : Second flag : Getting the curves

Recipe instructed to extract needles

11/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 1- WAV file : Second flag

CPA HW (Mayer-Sommer (CHES00), Brier et al. (CHES04))=⇒ Secret Key

Secret Key =⇒ flag

12/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 2- JPG file

13/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 2- JPG file : First flag

credit : Denelson83

14/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 2- JPG file : First flag

Order the cells according to their numbers

Blue =⇒ STEGHIDE, phrase about helped mate

Use STEGHIDE on jpg with password = previous phrase

Get Gabor.txt =⇒ first flag

15/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 2- JPG file : Second flag

In text file : FEN notation

16/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 2- JPG file : Second flag, path 1 : Solve it !

17/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 2- JPG file : Second flag, path 2 : Google it !

Cseh.jpg + Gabor.txt =⇒ Gabor Cseh

18/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 2- JPG file : Second flag

Encode each move using grid numbers (eg. G2-H4= 14,31)

Secret Key =⇒ flag

19/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 3- C file : Behavior

20/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 3- C file : Behavior

Wrong signature :

Correct signature :

Correct plaintext ? ? ?

21/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 3- C file : First flag, path 1 : side-channel

Prime generation by trial divisions

Generate random

”-” =⇒ not divisible

”/” =⇒ divisible =⇒ random+1

22/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 3- C file : First flag, path 1 : side-channel

Ideal application of Finke et al. (CHES09) :

Get a lot of modular equations involving the prime

Solve them using CRT

Factorize N

23/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 3- C file : First flag, path 2 : prime collision

Only 100 different primes can be generated by the server

Build {N1,N2, · · · }Compute gcd(N,N1), gcd(N,N2) · · ·Factorize N when gcd 6= 1

24/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 3- C file : First flag

First ciphertext only 4 blocks

Use server as decryption oracle =⇒ flag

25/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 3- C file : Second flag

Second ciphertext is a several hundreds of MB picture

Too long to use previous method1 (≥ month)

1 : Note to self : do not screw the server implementation, it couldbe DoS’ed otherwise.

26/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 3- C file : Second flag

Second ciphertext is a several hundreds of MB picture

Too long to use previous method1 (≥ month)

1 : Note to self : do not screw the server implementation, it couldbe DoS’ed otherwise.

26/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 3- C file : Second flag, path 1 : clever serverheckler

Ask for decryption of random blocks of the picture

Blank space =⇒ change area

Black zone =⇒ useful info =⇒ decrypt foreign blocks

Decryption of useful parts =⇒ flag

27/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 3- C file : Second flag, path 2 : fault attack

Ask for two decryptions of the same block

Answer wrongly =⇒ error in the 2nd to last round =⇒ C ∗

Answer correctly =⇒ C

Piret and Quisquater (CHES03) on AES decryption :(C ∗,C ) =⇒ secret key =⇒ flag

28/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 4- PNG file

29/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 4- PNG file : First flag

Pattern matching :

On cell =⇒ bit 1

Off cell =⇒ bit 0

30/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 4- PNG file : First flag, path 1 : static analysis

Look at strings

Get flag (one of the only strings that is not obfuscated)

31/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 4- PNG file : First flag, path 2 : emulation

Command file =⇒ GameBoy ROM

Launch a GB emulator =⇒ flag

32/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 4- PNG file : Second flag, path 1 : emulation

33/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 4- PNG file : Second flag, path 1 : emulation

34/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 4- PNG file : Second flag, path 1 : emulation

ROM is a padding oracle on AES-CBC

Vaudenay’s attack (EUROCRYPT02) =⇒ decryption 2 oracle

Script an attack (Lua scripting with Visual Boy Advance oremulator patching)

Decrypt ciphertext =⇒ flag

2. Except we have encryption here : same attack applies !35/39 A. Thillard, R. Benadjila CHES15 Challenge

Challenge 4- PNG file : First flag, path 2 : WB pwning

36/39 A. Thillard, R. Benadjila CHES15 Challenge

credit : yobibe

Challenge 4- PNG file : First flag, path 2 : WB pwning

Reverse soft and GB architecture (memory banks, etc.)

Break whitebox

Secret key =⇒ flag

37/39 A. Thillard, R. Benadjila CHES15 Challenge

Acknowledgments

We’d like to thank the following persons for their help in theconception and testing : Aurelie Bauer, Sonia Belaıd, GuillaumeBouffard, Jean-Christophe Delaunay, Thomas Fuhr, EmilienGirault, Pierre-Michel Ricordel, Joana Treger-Marim, PhilippeValembois, Eloi Vanderbeken, and all the persons on this obscureGB-ROM dev IRC channel that insisted half an hour on the factthat implementing a crypto algorithm on the GameBoy was useless.Martin also insisted for special thanks to Jacquie & Michel.

38/39 A. Thillard, R. Benadjila CHES15 Challenge

Call for challenge

There will be a challenge next year

More information coming soon

39/39 A. Thillard, R. Benadjila CHES15 Challenge

We want you ! ! !


Recommended