DiceCTF 2025 Quals
March 30, 2025This year, I wrote four challenges for DiceCTF Quals. In this post, I’ll go over the solutions for each challenge. You can find my solution code at github.com/defund/ctf.
vorpal-sword
This challenge implements the RSA-based oblivious transfer protocol described on Wikipedia. Our goal as the receiver is to leak both messages, thereby breaking the protocol’s security guarantee.
In the protocol, we send a value to the server, which uses and as encryption keys for the messages. In particular, the server sends and , as the ciphertexts. Here, and are random values generated by the server, and is the RSA private exponent.
The key to attacking this protocol is to notice that we can choose (modulo ), so that and . Since is odd, we have . This correlation is useful because we can compute , which is the sum of the messages. And since the messages are highly structured strings (either a death or survive message in the choose-your-own adventure game), we can figure out what they are from the sum alone.
winxy-pistol
This is a follow-up to vorpal-sword
, where the protocol
differs in two ways. First, messages are encrypted differently: the
server sends
and
,
where
is a hash function. This means that the solution from
vorpal-sword
will not work anymore. Second, the server uses
a fixed RSA key, instead of generating a new one each time, for the
oblivious transfers. We are going to attack the second change.
Suppose we behave honestly, as described on Wikipedia. For example, if we want to learn then we pick , where is a value we choose and is the public exponent. This guarantees , so we can always decrypt . In order to decrypt , we will open a new connection with the server and interact with it in parallel with our original connection.
Let and be the two messages and and be the random values in the new connection. If we pick , then the key for will be , which is precisely ! Therefore, the corresponding ciphertext will be . By guessing , we can obtain and decrypt in the original connection. If is a death message in the choose-your-own-adventure game (this is true 50% of the time), then guessing it is easy. Otherwise, we can open a new connection and try again.
fairy-ring
This challenge implements an insecure ring signature scheme. Given a set of public keys (which we do not know the private keys for), our goal is to forge a ring signature for some subset of the keys (we can choose the subset).
Let’s start by looking at how the challenge’s ring signature scheme works. Each public key defines a trapdoor function , which is hard to invert unless you know the corresponding secret key. In order to sign a message for a ring you are in, you first hash the message to a target value . The signature is a list of preimages for all of the public keys in the ring such that . Now suppose you are the -th member of the ring. In order to generate a signature, you first randomly sample . Then, you sample a preimage such that ; this is possible since you know the trapdoor for . The signature is , which indeed satisfies the verification check.
So how do we forge a signature? It turns out that depending on the trapdoor function, this construction is not secure. In particular, this challenge uses the UOV trapdoor function (see my previous blog post for an intro to UOV). When is a UOV map (actually, a multivariate quadratic map in general), it turns out that we can always find such that , for any choice of .
Let’s assume we know how to do this and see how to forge a ring signature. First, we’re going to choose a ring which consists of two copies the same public key (this is allowed by the server). Our goal now is to find , such that , where is the trapdoor function corresponding to the public key and is some fixed message we need to sign in order to obtain the flag. Now since the UOV trapdoor function is defined with a binary field, addition/subtraction and xor are actually the same! This means we can just pick such that , which we have assumed can be done.
Finally, let’s look at how to find such that . First, pick some arbitrary vector . Our goal will be to find some such that . Letting be the polar form of (again, see my previous blog post), we can rewrite this as finding such that . This is a linear equation in , so we can solve for it.
nil-circ
This is going to be a very high-level explanation. I’m going to assume you have a rough understanding of how the following things work: garbled circuits, the Free-XOR optimization implemented in swanky, and the oblivious transfer protocol being modified in the challenge.
First, let’s look at how the OT protocol is being modified. Instead of computing the keys as and (I’m using additive notation here), the server instead computes and . We can attack this by picking , so that is equal to . The server uses the keys to encrypt a set of wire labels: for the zero-label and for the one-label . In particular, the ciphertexts are and . But since and are equal, this means that we have . In the Free-XOR optimization, is the global offset used across all of the wires. This value must be kept secret for security to hold.
The rest of the challenge is figuring out how to leverage the knowledge of to obtain the server’s inputs to the garbled circuit. My solution is roughly as follows: since we know the global offset , know both labels for every wire in the circuit. Then whenever we receive a garbled table for an AND gate, we can figure out what the original labels represent, by decrypting the entire truth table. In general, each input labels is some XOR combination of the circuit inputs. We can build a linear system for all of these constraints and solve for the circuit inputs.