Tags: crypto dft cryptography

Rating:

# [UTCTF 2021] Sunset

## tl;dr

Break a [Diffie-Hellman](https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange) like scheme for generating a shared secret with a cryptosystem relating to some sort of
[discrete fourier transform (DFT)](https://en.wikipedia.org/wiki/Discrete_Fourier_transform).
The solution described here involves
exploiting the **group properties of a cyclic array under convolution modulo a prime**.

## Description

cryptography/Sunset; 15 solves, 996 points

Challenge author: oops


subset sumset what did i do Wrap the value of key with utflag{} for the flag.


Files: main.py and output.txt

## Encryption scheme and goal of the problem

First let's look what's going on by looking at the code in main.py:

python
N = 111
MOD = 10**9+7

...

A_sk = get_secret_key()
B_sk = get_secret_key()

A_pk = compute_public_key(A_sk)
B_pk = compute_public_key(B_sk)

print("Alice's public key:", A_pk)
print("Bob's public key:", B_pk)

remove_elements = random.sample(range(1,N), 20)

print("Remove: ", remove_elements)

for x in remove_elements:
A_sk.remove(x)
B_sk.remove(x)

A_shared = compute_arr(B_pk, A_sk)
B_shared = compute_arr(A_pk, B_sk)

assert(A_shared == B_shared)

key = hashlib.sha256(str(A_shared).encode('utf-8')).hexdigest()
print(key)


In summary the code does the following:

1. Generate secret key for Alice and Bob
2. Compute a public key from Alice and Bob's secret keys
3. Compute a public list removed_elements and remove from secret key
4. Compute a shared secret derived from one's secret key and the other's private key

Through some magic math voodoo, somehow calling the function
compute_arr on the other person's public key and their own
modified secret key, they end up with the same shared secret.
You can see the parallels of this with [Diffie-Hellman](https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange)
which also compute a shared secret in the same way.

The provided code above prints the shared secret key between Alice and Bob.
Inspecting the output.txt file we see:

Alice's public key: [337229599, 325950080, 542718415, 860180877, 323040995, 735779310, 864361739, 339968680, 3785502, 533120016, 467897389, 215111289, 669987332, 343447968, 613364155, 51939983, 765449638, 551522273, 206741830, 696620161, 429342149, 124186177, 279591669, 271013814, 267312863, 288321995, 348764133, 49562754, 432321364, 733407888, 336309352, 680320244, 258955444, 50477576, 936414592, 540997130, 244887424, 802248001, 190201074, 608424912, 230214096, 106258442, 396015541, 632533267, 826926560, 765609879, 938836920, 938836920, 765609879, 826926560, 632533267, 396015541, 106258442, 230214096, 608424912, 190201074, 802248001, 244887424, 540997130, 936414592, 50477576, 258955444, 680320244, 336309352, 733407888, 432321364, 49562754, 348764133, 288321995, 267312863, 271013814, 279591669, 124186177, 429342149, 696620161, 206741830, 551522273, 765449638, 51939983, 613364155, 343447968, 669987332, 215111289, 467897389, 533120016, 3785502, 339968680, 864361739, 735779310, 323040995, 860180877, 542718415, 325950080, 337229599, 243380866, 59055212, 837326354, 161482058, 581310056, 136700435, 58971689, 605319217, 379539507, 605319217, 58971689, 136700435, 581310056, 161482058, 837326354, 59055212, 243380866]
Bob's public key: [299803618, 455114136, 158280000, 635585934, 770371709, 383640342, 296136746, 167814744, 69244076, 541537643, 915075673, 662114959, 715449225, 683799468, 84778891, 896156816, 900734048, 198579752, 761121766, 717769786, 696556462, 127571411, 667366203, 170409968, 339590760, 825653373, 824582729, 15723318, 429669228, 984644620, 731130374, 784679266, 21817661, 158555711, 566121948, 42699221, 705127489, 434494456, 798843545, 597222370, 728101364, 552436778, 728101364, 597222370, 798843545, 434494456, 705127489, 42699221, 566121948, 158555711, 21817661, 784679266, 731130374, 984644620, 429669228, 15723318, 824582729, 825653373, 339590760, 170409968, 667366203, 127571411, 696556462, 717769786, 761121766, 198579752, 900734048, 896156816, 84778891, 683799468, 715449225, 662114959, 915075673, 541537643, 69244076, 167814744, 296136746, 383640342, 770371709, 635585934, 158280000, 455114136, 299803618, 22273348, 709433923, 414958344, 318725017, 13092806, 621372737, 546139744, 640412379, 142648001, 843445006, 404605625, 548571564, 663856325, 565838629, 565838629, 663856325, 548571564, 404605625, 843445006, 142648001, 640412379, 546139744, 621372737, 13092806, 318725017, 414958344, 709433923, 22273348]
Remove: [88, 2, 49, 14, 20, 91, 56, 79, 44, 81, 57, 73, 65, 67, 46, 84, 66, 17, 31, 53]


Notably we have Alice and Bob's public key and the remove array,
but the key is not.
As suggested in the description of the challenge,
the goal of the challenge is to recover the key.

## The implementation of the cryptosystem

Let's take a closer look at the functions used.
The first is the secret key which is generates a list of random numbers
between 1 and $N$ where each number has a random multiplicity between 1 and 10.
The list is then shuffled.
python
def get_secret_key():
key = []
for i in range(1, N):
x = random.randrange(1,10)
key += [i] * x
random.shuffle(key)
return key


The next function applies an **array** of size $N$
and an arbitrary length **list** of numbers that take on values between $1$ and $N$.
These **arrays** of size $N$ seem to be the objects of this cryptosystem.
and these **lists** seem to be the keys. I will use these two terms to distinguish between
the two.
For each number $a_i$ in the list of numbers,
it takes the array, and adds it modulo $MOD$ to a rotated version
of itself, where the rotation is by $a_i$ and modulo $N$.
This strongly smells of something involving a
[discrete fourier transform (DFT)](https://en.wikipedia.org/wiki/Discrete_Fourier_transform),
as it involving rotations of an array.

python
def compute_arr(arr, sk):
for x in sk:
new_arr = arr.copy()
for y in range(N):
new_arr[(x+y)%N] += arr[y]
new_arr[(x+y)%N] %= MOD
arr = new_arr
return arr


The last function explains how the public key is generated.
The secret key is applied to what is essentially an identity element of sorts,
an array $[1,0, ...,0]$

python
def compute_public_key(sk):
arr =  * N
arr = 1
return compute_arr(arr, sk)


## Investigating the cryptosystem

The first thing to do is to play around with the cryptosystem to see what's going on.
The most mysterious code is the compute_arr function, but its hard to understand
what it does, so it serves to investigate how it is used.
The cyclic nature of things really smelled like something involving DFTS.
I'm only familiar with DFTS from the
[Fast Fourier Transform (FFT)](https://en.wikipedia.org/wiki/Fast_Fourier_transform),
which has numerous applications in computer science. That inspired this approach.

The most suspicious thing is how the two generate a shared secret when they know nothing
about each other's secret keys, except they know each other's public keys and removed
the same elements from their own secret keys.
In particular, the order is randomized, and the removed elements are the first ones.

The easiest explanation is that the **order doesn't matter**, and whatever operation
compute_arr does to an array is independent of whatever list that's passed in.

We easily verify that this is indeed the case with some code:

python
>>> A_pk = compute_public_key(A_sk)
>>> random.shuffle(A_sk)
>>> A2_pk = compute_public_key(A_sk)
>>> A_pk == A2_pk
True


This means that to compute their shared secret, they are essentially **concatenating their
secret keys and removing the same number of elements.**
So if we could recover their secret keys, we'd be done (I believe it should be possible to
do so because of the connection to DFTS, but I haven't spent the time to think about
it yet)
Because I know this has something to do with DFTS, concatenation of the lists
(or more precisely pointwise addition of the multiplicities of the elements)
is something done in the *Fourier transform* space,
while the arrays live in the *primal* space.

I reasoned that there must be some sort of group operation on the arrays that
would correspond to the concatenation of lists in the *Fourier transform* space.
Guessing from what I know about FFT, I figured it might be **convolution**, so
I coded it and tried it out.

python
def conv_arr(a1, a2):
a3 =  * N
for i in range(N):
for j in range(N):
a3[i] += a1[j] * a2[(i-j+N)%N]
a3[i] %= MOD
return a3

assert(compute_arr(compute_public_key(A_sk), B_sk) == conv_arr(compute_public_key(A_sk), compute_public_key(B_sk)))


Lo and behold, it actually worked!
Furthermore it seems that the array $I = [1,0,...,0]$
is the **identity** element, as conv_arr(I, arr) == arr.
This means that we have a **commutative group structure** in the *Fourier transform* space
with the group operator being **convolution**.
With this group structure, all we need to do is apply the group operator to A_pk and
B_pk and apply the group operator to the **inverse** of compute_public_key(remove_elements)!

Technically I haven't shown that this is a group yet, since its not clear that these inverses
exists.
But things are working modulo a prime $MOD = 10^9+7$, so there's strong reason
to believe that applying the group operation to a single element
enough times it will be cyclic.

Now I have no idea how to compute the inverse,
so I made it a goal to compute the inverse of compute_public_key() which I will denote by
$\mathcal{T}()$.
If we knew the **order** of the elements in the group,
we could compute inverses.
To see why, let's denote the order by $m$ so

$$\mathcal{T}()^m = \mathcal{T}().$$

Then $\mathcal{T}()^{m-2}$ would be an inverse.
Since operations are done modulo $MOD$, it stands to reason that $MOD$ would be a good guess of
an order of an element.
To verify this guess I would need to take a lot of convolutions (which would be too slow), but
we can use a
[fast exponentiation technique](https://en.wikipedia.org/wiki/Exponentiation_by_squaring)
to do so with only $O(\log MOD)$ convolutions.
python
def compute_pow(sk, t):
arr =  * N
arr = 1
ans = arr.copy()
arr = compute_arr(arr, sk)
while t:
if t&1:
ans = conv_arr(ans, arr)
arr = conv_arr(arr, arr)
t >>= 1
return ans


Unfortunately it turned out that $MOD$ was not the order.

python
>>> compute_public_key()
[1, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]
>>> compute_pow(, MOD)
[1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]
>>> compute_public_key() == compute_pow(, MOD)
False

However, $\mathcal{T}()$ looked a lot like $\mathcal{T}()$.
python
>>> compute_public_key() == compute_pow(, MOD)
True

This leads me to conjecture that

$$\mathcal{T}([k])^{MOD} = \mathcal{T}([8k]).$$

I do some testing and this statement seems to be true.
Next I observe that as the array is cyclic mod $N = 111$ so for some value $h$,

$$\mathcal{T}([k])^{MOD^h} = \mathcal{T}([(8hk\;\text{mod}\;111)]).$$

Choosing $h = \phi(N) = 72$ we should get what we want!

$$\mathcal{T}([k])^{MOD^{72}} = \mathcal{T}([k]).$$

It takes a few seconds to run and verify this, but it works!
python
>>> compute_pow(, MOD**72) == compute_public_key()
True

This means we can find inverses now!

python
def inverse_arr(arr, sk):
ans = conv_arr(arr, compute_pow(sk, MOD**72-2))
return ans

Now , we've computed the order of elements of the group, we finish it off in one
beautiful line of computation:

python
shared = inverse_arr(conv_arr(A_pk, B_pk), removed_elements)


It takes 6 seconds on my beefy machine,
but that's to be expected when we have to do $O(\phi(N)\cdot \log MOD)$ convolutions
of a length $N$ array in python.

## The mathematics behind it

Why does this work? Well mostly because of the
[shift theorem and circular convolution theorem](https://en.wikipedia.org/wiki/Discrete_Fourier_transform#Shift_theorem), compute_arr adds to the array
a phase shifted copy of itself.
On top of this convolution naturally forms a group operation,
so it magically lends itself to this group structure.
I didn't really think too hard about why these things work, and mostly just made good guesses.
I'll work out the math some other day (including as to whether directly recovering the private keys is possible)

## Solve script

This is was the final script:
python
import hashlib

N = 111
MOD = 10**9+7

A_pk = [337229599, 325950080, 542718415, 860180877, 323040995, 735779310, 864361739, 339968680, 3785502, 533120016, 467897389, 215111289, 669987332, 343447968, 613364155, 51939983, 765449638, 551522273, 206741830, 696620161, 429342149, 124186177, 279591669, 271013814, 267312863, 288321995, 348764133, 49562754, 432321364, 733407888, 336309352, 680320244, 258955444, 50477576, 936414592, 540997130, 244887424, 802248001, 190201074, 608424912, 230214096, 106258442, 396015541, 632533267, 826926560, 765609879, 938836920, 938836920, 765609879, 826926560, 632533267, 396015541, 106258442, 230214096, 608424912, 190201074, 802248001, 244887424, 540997130, 936414592, 50477576, 258955444, 680320244, 336309352, 733407888, 432321364, 49562754, 348764133, 288321995, 267312863, 271013814, 279591669, 124186177, 429342149, 696620161, 206741830, 551522273, 765449638, 51939983, 613364155, 343447968, 669987332, 215111289, 467897389, 533120016, 3785502, 339968680, 864361739, 735779310, 323040995, 860180877, 542718415, 325950080, 337229599, 243380866, 59055212, 837326354, 161482058, 581310056, 136700435, 58971689, 605319217, 379539507, 605319217, 58971689, 136700435, 581310056, 161482058, 837326354, 59055212, 243380866]
B_pk = [299803618, 455114136, 158280000, 635585934, 770371709, 383640342, 296136746, 167814744, 69244076, 541537643, 915075673, 662114959, 715449225, 683799468, 84778891, 896156816, 900734048, 198579752, 761121766, 717769786, 696556462, 127571411, 667366203, 170409968, 339590760, 825653373, 824582729, 15723318, 429669228, 984644620, 731130374, 784679266, 21817661, 158555711, 566121948, 42699221, 705127489, 434494456, 798843545, 597222370, 728101364, 552436778, 728101364, 597222370, 798843545, 434494456, 705127489, 42699221, 566121948, 158555711, 21817661, 784679266, 731130374, 984644620, 429669228, 15723318, 824582729, 825653373, 339590760, 170409968, 667366203, 127571411, 696556462, 717769786, 761121766, 198579752, 900734048, 896156816, 84778891, 683799468, 715449225, 662114959, 915075673, 541537643, 69244076, 167814744, 296136746, 383640342, 770371709, 635585934, 158280000, 455114136, 299803618, 22273348, 709433923, 414958344, 318725017, 13092806, 621372737, 546139744, 640412379, 142648001, 843445006, 404605625, 548571564, 663856325, 565838629, 565838629, 663856325, 548571564, 404605625, 843445006, 142648001, 640412379, 546139744, 621372737, 13092806, 318725017, 414958344, 709433923, 22273348]
rem = [88, 2, 49, 14, 20, 91, 56, 79, 44, 81, 57, 73, 65, 67, 46, 84, 66, 17, 31, 53]

# apply transform to convolution world
def compute_arr(arr, sk):
for x in sk:
new_arr = arr.copy()
for y in range(N):
# take values in sk, and circularly add values of arr.
new_arr[(x+y)%N] += arr[y]
new_arr[(x+y)%N] %= MOD

arr = new_arr
return arr

# fast exponentiation
def compute_pow(sk, t):
arr =  * N
arr = 1
ans = arr.copy()
arr = compute_arr(arr, sk)
while t:
if t&1:
ans = conv_arr(ans, arr)
arr = conv_arr(arr, arr)
t >>= 1
return ans

# compute inverse of array
def inverse_arr(arr, sk):
ans = conv_arr(arr, compute_pow(sk, MOD**72-2))
return ans

# convolution is group operation
def conv_arr(a1, a2):
a3 =  * N
for i in range(N):
for j in range(N):
a3[i] += a1[j] * a2[(i-j+N)%N]
a3[i] %= MOD
return a3

# the transform operation
def compute_public_key(sk):
arr =  * N
arr = 1
return compute_arr(arr, sk)

A_shared = inverse_arr(conv_arr(A_pk, B_pk), rem)
key = hashlib.sha256(str(A_shared).encode('utf-8')).hexdigest()
print(key)


Flag:

utflag{3f3ae3284970df318be8404747bb003fe47cd9bdbb57fc1da52a01b3c028180f}


Original writeup (https://ubcctf.github.io/2022/03/utctf-sunset/).