We'll perform a DFA attack on externally encoded outputs with the tool DarkPhoenix.
Installation:
pip install darkphoenixAES
The whitebox code nosuchcon_2013_whitebox.py is similar to the one in RE/result/ but rewritten as a class compatible with DarkPhoenix.
This attack requires the tables extracted from the reverse-engineering step, so if you didn't do it yet:
cd ../RE
./extract.sh
cd -
Then:
./runme.py
It breaks round keys and reverts the AES key scheduling till
key: 4e5343234f707069646123b8dce442d0
We can see that the challenge key starts actually with:
echo -n "NSC#Oppida#"|xxd -p
4e5343234f707069646123