Writeup for the rps-casino Cryptography challenge.
This problem costed me a good 20 hours because of some stupid z3 gimmick. I think if not for that, could have solved this problem in 2 hours at max, which would have let me to dedicate more time for a 3rd crypto solve smh ๐ซ.
This is the program script:
#!/usr/local/bin/pythonimportosfromCrypto.Util.numberimportbytes_to_longdefLFSR():state=bytes_to_long(os.urandom(8))while1:yieldstate&0xfforiinrange(4):bit=(state^(state>>1)^(state>>3)^(state>>4))&1state=(state>>1)|(bit<<63)rng=LFSR()n=56print(f"Let's play rock-paper-scissors! We'll give you {n} free games, but after that you'll have to beat me 50 times in a row to win. Good luck!")rps=["rock","paper","scissors","rock"]nums=[]foriinrange(n):choice=next(rng)%3inp=input("Choose rock, paper, or scissors: ")ifinpnotinrps:print("Invalid choice")exit(0)ifinp==rps[choice]:print("Tie!")elifrps.index(inp,1)-1==choice:print("You win!")else:print("You lose!")foriinrange(50):choice=next(rng)%3inp=input("Choose rock, paper, or scissors: ")ifinpnotinrps:print("Invalid choice")breakifrps.index(inp,1)-1!=choice:print("Better luck next time!")breakelse:print("You win!")else:print(open("flag.txt").read())
The problem flow is as follows:
We have to play 56 rounds of rock-paper-scissors against the server. Whatever the result is in those rounds, it does not matter.
Then we have to play 50 rounds more and win all of them. If we are successful, flag will be printed.
In both these steps, the computerโs move is generated through a function called LFSR.
Understanding LFSR
Linear Feedback Shift Register or in short LFSR are random number generators where the output bits depend on some linear combinations of the previous bits.
Let us try to understand how an LCG works with the help of the above figure.
The bits s0โs1โโฆs7โโsiโโ{0,1} represent the seed or the initial state of the LFSR. If seed is somehow compromised, the whole secrecy of the LFSR is lost.
Since there are 8 initial bits, this is a 8bit LFSR.
As previously mentioned, the next bits (s8โs9โโฆsnโโฆ) depend on some linear combination of the previous bits.
XOR is the linear operation here(actually xor is not linear in terms of traditional math, but under some specific circumstances, it does become linear which we will see in a bit). s8โ=s6โโs5โโs4โโs0โ
Notice how s8โ depends only s6โ,s5โ,s4โ,s0โ and not all of the state bits? Those bits on whom the next state depends are called taps. Taps are a key element of any LFSR. Choosing mathematically secured taps is very important to ensure the security of LFSRs. Let us generalize the taps for the above LFSR: snโ=snโ2โโsnโ3โโsnโ4โโsnโ8โโn>7.
There is a better representation of taps, which helps us model LFSR mathematically in a very convenient manner. Remember how I said xor is linear under specific circumstances? It is linear under addition mod 2. That is, xor is denoted simply as b0โโb1โ=(b0โ+b1โ)mod2, where biโโ{0,1}. We can thus represent the above tap equation with snโ=snโ2โ+snโ3โ+snโ4โ+snโ8โmod2. Under Z/Z2 this is known as the Feedback polynomial which for the given LFSR is 1+x4+x5+x6+x8.
LFSR as a matrix
Suppose we want to find s99784โ for the above LFSR. Do we need to run the simulation 99784 times to get that?
No. There is a very neat approach to this due to the matrix representation of LFSR. Consider this matrix:
next statesโโโskโsk+1โsk+2โโฎsk+nโ1โโโ โโโโ=companion matrix(T)โโโ00โฎc0โโ10โฎc1โโ01โฎc2โโโฏโฏโฑโฏโ0โฎ1cnโ1โโโ โโโโโ previous statesโโโskโ1โskโsk+1โโฎsk+nโ2โโโ โโโโ=raised to powerkโโโ00โฎc0โโ10โฎc1โโ01โฎc2โโโฏโฏโฑโฏโ0โฎ1cnโ1โโโ โโkโโโ initial statesโโโs0โs1โs2โโฎsnโ1โโโ โโโโ
This is the generalized representation of a nbit LFSR where akโ,ak+1โ,ak+2โ,โฆ are state bits. The square matrix is known as companion matrix. This is equivalent to a transition matrix and is fixed for a particular LFSR. The c0โ,c1โ,c2โ,โฆ,cnโ1โ in the companion matrix represents the tap bits.
What would these matrices look like for the given LFSR?
Given is a 64-bit LFSR with 3 tap positions. Every time a game is played, 4 states of the LFSR is combined and returned which is later used after modulo by 3. Simply put, the 4 lower bits of the LFSR are used modulo 3 as the opponentโs move.
All operations previously were on Z/Z2. It now shifts to Z/Z16 and then to Z/Z3. This last conversion is what complicates everything.
Initial approach (didnโt work)
My first thought was to convert this to a graph problem. We can do a dfs where nodes represent the moves and edges represent the transition operations from one move to another. We can prune the branches based on modulo values we received from the initial 56 games.
The problem with this approach was that it gave too many valid seeds. I could not figure out a way to eliminate them and keep a single seed.
Correct approach
Every move in the game can be represented as a constraint. We can represent the moves of the first 56 games as constraints and use a constraint solver which would give valid configurations to satisfy our constraints. A very popular constraint solver is z3. We can represent the state as a bit-vector of 64 bits and add all the constraints.
s1โs2โs3โโฎs56โโโก1mod3โก2mod3โก0mod3โก1mod3โโญโฌโซโthese are constraintsโ
In my solution, I represented each bit as a variable. But navigating z3 is โฆ a bit sophisticated. I had to go through a lot of trial and error to make it work.