The CTF is over! Congratulations to perfect blue, corruptedpwnis and p4! Feedback: https://flu.xxx/feedback
Conquering Premium Access
15 Solves
From: midao Verified Member
Categories: crypto
Difficulty: hard
Autoplay:

A friend of mine works at an amateur site and found some stuff about their custom hardware encryption module lying around. He gave me some power measurements and also mentioned the following:

  • some engineers mentioned working on an AES implementation with T-Tables;
  • the traces he found were named aligned or something like this; and
  • no protections are implemented since all masks are used for COVID prevention.

Can you help us to conquer that juicy premium content?

Download challenge files

Note: There are 10000 traces in the format trace1 | trace2 | trace3 | ... with 10000 points each. Each point is one byte and should be interpreted as int8. The plaintexts are ordered bytewise, that is byte1 | byte2 | byte3 | ... where each byteX consists of 10000 plaintext bytes, one for each trace in order (so byte1_trace1 | byte1_trace2 | byte1_trace3 | ...). The key is the same for all measurements and every two clock cycles one round of the cipher is computed.

Thank you to Dr. Amir Moradi who generously allowed us to use the power traces for this challenge. If you want to learn more about side channel attacks check out his course Physical Attacks & Countermeasures.


The CTF is over. You cannot submit any more solutions.

Comments (1)

  • 2020-10-24 11:34:01
    The challenge description incorrectly stated that the module is a hardware decryption module. It's in fact a hardware encryption module. The description is now fixed.
    Dislike · Reply