This is an old revision of the document!
In this exercise you will perform a timing attack against CBC-MAC.
You are given access to a CBC-MAC $\mathsf{Verify}$ oracle, which tests whether the received tag matches the one computed using the secret key. Timing attacks exploit naive equality comparisons between the received and computed MACs (for example, the comparison is done byte by byte; more checks means more latency).
Your task is to produce a forged tag for the message 'Hristos a inviat' without knowing the key. Do this by iterating through all possible values for a specific byte; when the oracle's latency for a certain value seems larger than the rest, it suggests that the equality test returned True and the oracle passed to the next byte.
Try to start by finding the first byte and checking your result with the timing attack.
You can use time.clock()
before and after each oracle query to measure its runtime.
TODO1: Implement the CBC-MAC function.
TODO2: Implement the MAC time verification attack and obtain the desired MAC without knowing the key.
import sys import random import string import time import itertools import operator import base64 from Crypto.Cipher import AES from Crypto.Hash import SHA256 def slow_foo(): p = 181 k = 2 while k < p: if p % k == 0: return k += 1 def aes_enc(k, m): """ Encrypt a message m with a key k in ECB mode using AES as follows: c = AES(k, m) Args: m should be a bytestring multiple of 16 bytes (i.e. a sequence of characters such as 'Hello...' or '\x02\x04...') k should be a bytestring of length exactly 16 bytes. Return: The bytestring ciphertext c """ aes = AES.new(k) c = aes.encrypt(m) return c def aes_dec(k, c): """ Decrypt a ciphertext c with a key k in ECB mode using AES as follows: m = AES(k, c) Args: c should be a bytestring multiple of 16 bytes (i.e. a sequence of characters such as 'Hello...' or '\x02\x04...') k should be a bytestring of length exactly 16 bytes. Return: The bytestring message m """ aes = AES.new(k) m = aes.decrypt(c) return m def aes_enc_cbc(k, m, iv): """ Encrypt a message m with a key k in CBC mode using AES as follows: c = AES(k, m) Args: m should be a bytestring multiple of 16 bytes (i.e. a sequence of characters such as 'Hello...' or '\x02\x04...') k should be a bytestring of length exactly 16 bytes. iv should be a bytestring of length exactly 16 bytes. Return: The bytestring ciphertext c """ aes = AES.new(k, AES.MODE_CBC, iv) c = aes.encrypt(m) return c def aes_dec_cbc(k, c, iv): """ Decrypt a ciphertext c with a key k in CBC mode using AES as follows: m = AES(k, c) Args: c should be a bytestring multiple of 16 bytes (i.e. a sequence of characters such as 'Hello...' or '\x02\x04...') k should be a bytestring of length exactly 16 bytes. iv should be a bytestring of length exactly 16 bytes. Return: The bytestring message m """ aes = AES.new(k, AES.MODE_CBC, iv) m = aes.decrypt(c) return m def aes_cbc_mac(k, m): """ Compute a CBC-MAC of message m with a key k using AES as follows: t = AES-CBC-MAC(k=(k1,k2), m), where k1 is used for the raw-CBC operation and k2 is used for the final encryption. k1 and k2 are derived from k as follows: [k1|k2] = SHA256(k | "CBC MAC keys") Note: the IV for CBC in this case will be 0. Args: m should be a bytestring multiple of 16 bytes (i.e. a sequence of characters such as 'Hello...' or '\x02\x04...') k should be a bytestring of length exactly 16 bytes. Return: The bytestring MAC t, of 16 bytes. """ #Require good size m = m.ljust(16) k = k.ljust(16) #Derive the keys for raw-CBC and for the final tag #[k1 | k2] = SHA256(k + "CBC MAC keys") #Get the MAC: #1 - Do aes-CBC with k1 and iv=0, then keep only last block (last 16 bytes) of encryption #2 - Perform another AES encryption (simple, without CBC) on the last block from #1 using k2 #t = tag t = 16*'\x00' return t def verify(message, tag): key = 'Cozonace si oua ' # Get correct tag goodtag = aes_cbc_mac(key, message) # Compare tags for i in range(16): # Artificially extend byte comparison duration slow_foo() if tag[i] != goodtag[i]: return False return True def main(): message = 'Hristos a inviat' # Step 1. Iterate through all possible first byte values, and call the # Verify oracle for each of them tag = 16*'\x00' verify(message, tag) # Step 2. Store the byte that caused the longest computation time # Step 3. Continue the operation for each byte (except the last) # Step 4. Guess the last byte, and query the oracle with the complete tag mytag = '???' result = verify(message, mytag) if result == True: print "Found tag: " + mytag if __name__ == "__main__": main()
Alice wants to share a secret with Bob, but she knows that if she explicitly tells it to Bob, Eve somehow will find out (she hears everything). So she and Bob establish a small game which helps them think about the same secret, without saying it. The game goes like this:
$\mathsf{Puzzle}_i = \mathsf{AES}(\mathsf{key} = 0^{14} \| i, \mathsf{plaintext = Puzzle} \| i \| secret_i)$ where $secret_i$ represents the $i$-th secret Alice generated (represents 8 randomly generated bytes) and which should be figured out by Bob.
In the end, both Alice and Bob share the same secret, and Eve has no clue about it.
Your job is to implement this mechanism starting from the following skeleton:
import random import string from Crypto.Cipher import AES import os def aes_enc(k, m): """ Encrypt a message m with a key k in ECB mode using AES as follows: c = AES(k, m) Args: m should be a bytestring multiple of 16 bytes (i.e. a sequence of characters such as 'Hello...' or '\x02\x04...') k should be a bytestring of length exactly 16 bytes. Return: The bytestring ciphertext c """ aes = AES.new(k) c = aes.encrypt(m) return c def aes_dec(k, c): """ Decrypt a ciphertext c with a key k in ECB mode using AES as follows: m = AES(k, c) Args: c should be a bytestring multiple of 16 bytes (i.e. a sequence of characters such as 'Hello...' or '\x02\x04...') k should be a bytestring of length exactly 16 bytes. Return: The bytestring message m """ aes = AES.new(k) m = aes.decrypt(c) return m alice_keys = [] bob_key = [] # TODO This is Alice. She generates 2^16 random keys and 2^16 puzzles. # A puzzle has the following formula: # puzzle[i] = aes_enc(key = 0..0 + i, plaintext ="Puzzle" + chr(i) + chr(j) + alice_keys[i]) # This function shall fill in the alice_keys list and shall return a list of 2^16 puzzles. def gen_puzzles(): # TODO # TODO This is Bob. He tries to solve one random puzzle. His purpose is to solve one random puzzle # offered by Alice. # This function shall fill in the bob_key list with the secret discovered by Bob. # The function shall return the index of the chosen puzzle. def solve_puzzle(puzzles): # TODO def main(): # Alice generates some puzzles puzzles = gen_puzzles() # Bob solves one random puzzle and discovers the secret x = solve_puzzle(puzzles) print "Bob's secret key: " + bob_key[0] # Alice receives the puzzle index from Bob and now knows the secret print "Alice's secret key: " + alice_keys[x] # The secret should be the same, even if it was not explicitly shared if bob_key[0] == alice_keys[x]: print ":)" else: print ":(" if __name__ == "__main__": main()