Skip to content

Latest commit

 

History

History

DFA

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 

DarkPhoenixAES attack

We'll perform a DFA attack on externally encoded outputs with the tool DarkPhoenix.

Installation:

pip install darkphoenixAES

The whitebox code nosuchcon_2013_whitebox.py is similar to the one in RE/result/ but rewritten as a class compatible with DarkPhoenix.

This attack requires the tables extracted from the reverse-engineering step, so if you didn't do it yet:

cd ../RE
./extract.sh
cd -

Then:

./runme.py

It breaks round keys and reverts the AES key scheduling till

key: 4e5343234f707069646123b8dce442d0

We can see that the challenge key starts actually with:

echo -n "NSC#Oppida#"|xxd -p
4e5343234f707069646123