Finish challenge 30

This commit is contained in:
2022-08-20 15:50:04 -04:00
parent 106b8febaf
commit 9a9b5335f1
4 changed files with 267 additions and 158 deletions

View File

@@ -47,9 +47,8 @@ fn main() {
set4::challenge28(); set4::challenge28();
set4::challenge29(); set4::challenge29();
set4::challenge30(); set4::challenge30();
set4::challenge31();
} else { } else {
set4::challenge28(); set4::challenge31();
set4::challenge29();
set4::challenge30();
} }
} }

View File

@@ -1,95 +1,160 @@
// MD4 implementation based on https://docs.rs/md4/latest/md4/ // MD4 implementation based on https://docs.rs/md4/latest/md4/
use crate::bytes::Bytes; use crate::bytes::Bytes;
const BLOCK_BYTES: usize = 64;
// #[derive(Clone)] pub struct Md4Core {
// pub struct Md4Core { byte_len: u64,
// block_len: u64, state: [u32; 4],
// state: [u32; 4], }
// }
impl Default for Md4Core {
// impl Default for Md4Core { #[inline]
// #[inline] fn default() -> Self {
// fn default() -> Self { let state = [0x6745_2301, 0xEFCD_AB89, 0x98BA_DCFE, 0x1032_5476];
// let state = [0x6745_2301, 0xEFCD_AB89, 0x98BA_DCFE, 0x1032_5476]; Self { state, byte_len: 0 }
// Self { }
// state, }
// block_len: 0, impl Md4Core {
// } fn update(&mut self, bytes: &[u8; BLOCK_BYTES]) {
// } compress(&mut self.state, bytes);
// } self.byte_len += BLOCK_BYTES as u64;
}
// fn compress(state: &mut [u32; 4], input: &Block<Md4Core>) {
// fn f(x: u32, y: u32, z: u32) -> u32 { pub fn get_padding(&self, buffer: &[u8]) -> Vec<u8> {
// (x & y) | (!x & z) let bit_len = self
// } .byte_len
.wrapping_add(buffer.len() as u64)
// fn g(x: u32, y: u32, z: u32) -> u32 { .wrapping_mul(8);
// (x & y) | (x & z) | (y & z)
// } let mut padding = vec![];
padding.push(0x80);
// fn h(x: u32, y: u32, z: u32) -> u32 { while (buffer.len() + padding.len()) % BLOCK_BYTES != (BLOCK_BYTES - 8) {
// x ^ y ^ z padding.push(0x0);
// } }
padding.append(&mut (bit_len as u32).to_le_bytes().to_vec());
// fn op1(a: u32, b: u32, c: u32, d: u32, k: u32, s: u32) -> u32 { padding.append(&mut ((bit_len >> 32) as u32).to_le_bytes().to_vec());
// a.wrapping_add(f(b, c, d)).wrapping_add(k).rotate_left(s) padding
// } }
// fn op2(a: u32, b: u32, c: u32, d: u32, k: u32, s: u32) -> u32 { fn finalize(&mut self, mut buffer: Vec<u8>) -> Bytes {
// a.wrapping_add(g(b, c, d)) buffer.append(&mut self.get_padding(&buffer));
// .wrapping_add(k) for bytes in buffer.chunks(BLOCK_BYTES) {
// .wrapping_add(0x5A82_7999) compress(&mut self.state, &bytes.try_into().unwrap());
// .rotate_left(s) }
// }
Bytes(
// fn op3(a: u32, b: u32, c: u32, d: u32, k: u32, s: u32) -> u32 { self.state
// a.wrapping_add(h(b, c, d)) .iter()
// .wrapping_add(k) .map(|i| i.to_le_bytes())
// .wrapping_add(0x6ED9_EBA1) .flatten()
// .rotate_left(s) .collect(),
// } )
}
// let mut a = state[0];
// let mut b = state[1]; pub fn hash(&mut self, bytes: &Bytes) -> Bytes {
// let mut c = state[2]; let mut final_bytes = vec![];
// let mut d = state[3]; for bytes in bytes.0.chunks(BLOCK_BYTES) {
if bytes.len() == BLOCK_BYTES {
// // load block to data self.update(&bytes.try_into().unwrap());
// let mut data = [0u32; 16]; } else {
// for (o, chunk) in data.iter_mut().zip(input.chunks_exact(4)) { final_bytes = bytes.to_vec();
// *o = u32::from_le_bytes(chunk.try_into().unwrap()); }
// } }
self.finalize(final_bytes)
// // round 1 }
// for &i in &[0, 4, 8, 12] {
// a = op1(a, b, c, d, data[i], 3); pub fn fix(&mut self, fixate: [u32; 4], byte_len: u64) {
// d = op1(d, a, b, c, data[i + 1], 7); for i in 0..4 {
// c = op1(c, d, a, b, data[i + 2], 11); self.state[i] = fixate[i];
// b = op1(b, c, d, a, data[i + 3], 19); }
// } self.byte_len = byte_len;
}
// // round 2 }
// for i in 0..4 {
// a = op2(a, b, c, d, data[i], 3); fn compress(state: &mut [u32; 4], input: &[u8; BLOCK_BYTES]) {
// d = op2(d, a, b, c, data[i + 4], 5); fn f(x: u32, y: u32, z: u32) -> u32 {
// c = op2(c, d, a, b, data[i + 8], 9); (x & y) | (!x & z)
// b = op2(b, c, d, a, data[i + 12], 13); }
// }
fn g(x: u32, y: u32, z: u32) -> u32 {
// // round 3 (x & y) | (x & z) | (y & z)
// for &i in &[0, 2, 1, 3] { }
// a = op3(a, b, c, d, data[i], 3);
// d = op3(d, a, b, c, data[i + 8], 9); fn h(x: u32, y: u32, z: u32) -> u32 {
// c = op3(c, d, a, b, data[i + 4], 11); x ^ y ^ z
// b = op3(b, c, d, a, data[i + 12], 15); }
// }
fn op1(a: u32, b: u32, c: u32, d: u32, k: u32, s: u32) -> u32 {
// state[0] = state[0].wrapping_add(a); a.wrapping_add(f(b, c, d)).wrapping_add(k).rotate_left(s)
// state[1] = state[1].wrapping_add(b); }
// state[2] = state[2].wrapping_add(c);
// state[3] = state[3].wrapping_add(d); fn op2(a: u32, b: u32, c: u32, d: u32, k: u32, s: u32) -> u32 {
// } a.wrapping_add(g(b, c, d))
.wrapping_add(k)
pub fn hash(_bytes: &Bytes) -> Bytes { .wrapping_add(0x5A82_7999)
Bytes::from_hex("31d6cfe0d16ae931b73c59d7e0c089c0") .rotate_left(s)
}
fn op3(a: u32, b: u32, c: u32, d: u32, k: u32, s: u32) -> u32 {
a.wrapping_add(h(b, c, d))
.wrapping_add(k)
.wrapping_add(0x6ED9_EBA1)
.rotate_left(s)
}
let mut a = state[0];
let mut b = state[1];
let mut c = state[2];
let mut d = state[3];
// load block to data
let mut data = [0u32; 16];
for (o, chunk) in data.iter_mut().zip(input.chunks_exact(4)) {
*o = u32::from_le_bytes(chunk.try_into().unwrap());
}
// round 1
for &i in &[0, 4, 8, 12] {
a = op1(a, b, c, d, data[i], 3);
d = op1(d, a, b, c, data[i + 1], 7);
c = op1(c, d, a, b, data[i + 2], 11);
b = op1(b, c, d, a, data[i + 3], 19);
}
// round 2
for i in 0..4 {
a = op2(a, b, c, d, data[i], 3);
d = op2(d, a, b, c, data[i + 4], 5);
c = op2(c, d, a, b, data[i + 8], 9);
b = op2(b, c, d, a, data[i + 12], 13);
}
// round 3
for &i in &[0, 2, 1, 3] {
a = op3(a, b, c, d, data[i], 3);
d = op3(d, a, b, c, data[i + 8], 9);
c = op3(c, d, a, b, data[i + 4], 11);
b = op3(b, c, d, a, data[i + 12], 15);
}
state[0] = state[0].wrapping_add(a);
state[1] = state[1].wrapping_add(b);
state[2] = state[2].wrapping_add(c);
state[3] = state[3].wrapping_add(d);
}
pub fn hash(bytes: &Bytes) -> Bytes {
let mut md4 = Md4Core::default();
md4.hash(bytes)
}
pub fn authenticate(message: &Bytes, key: &Bytes) -> Bytes {
let mut c = vec![];
c.append(&mut key.0.to_vec());
c.append(&mut message.0.to_vec());
hash(&Bytes(c))
}
pub fn verify(message: &Bytes, key: &Bytes, mac: &Bytes) -> bool {
return authenticate(&message, &key) == *mac;
} }

View File

@@ -228,46 +228,80 @@ pub fn challenge29() {
} }
assert!(sha1::verify(&Bytes(forged_message), &key, &mac_forged)); assert!(sha1::verify(&Bytes(forged_message), &key, &mac_forged));
println!("[okay] Challenge 29: forged SHA-1 keyed MAC successfully"); println!("[okay] Challenge 29: extended SHA-1 keyed message successfully");
} }
pub fn challenge30() { pub fn challenge30() {
// Second verse, same as the first, but use MD4 instead of SHA-1. Having // test MD4 implementation
// done this attack once against SHA-1, the MD4 variant should take much
// less time; mostly just the time you'll spend Googling for an
// implementation of MD4.
assert_eq!( assert_eq!(
md4::hash(&Bytes::from_utf8("")), md4::hash(&Bytes::from_utf8("")),
Bytes::from_hex("31d6cfe0d16ae931b73c59d7e0c089c0"), Bytes::from_hex("31d6cfe0d16ae931b73c59d7e0c089c0"),
); );
// assert_eq!( assert_eq!(
// md4::hash(&Bytes::from_utf8("a")), md4::hash(&Bytes::from_utf8("a")),
// Bytes::from_hex("bde52cb31de33e46245e05fbdbd6fb24"), Bytes::from_hex("bde52cb31de33e46245e05fbdbd6fb24"),
// ); );
// assert_eq!( assert_eq!(
// md4::hash(&Bytes::from_utf8("abc")), md4::hash(&Bytes::from_utf8("abc")),
// Bytes::from_hex("a448017aaf21d8525fc10ae87aa6729d"), Bytes::from_hex("a448017aaf21d8525fc10ae87aa6729d"),
// ); );
// assert_eq!( assert_eq!(
// md4::hash(&Bytes::from_utf8("message digest")), md4::hash(&Bytes::from_utf8("abcdefghijklmnopqrstuvwxyz")),
// Bytes::from_hex("d9130a8164549fe818874806e1c7014b"), Bytes::from_hex("d79e1c308aa5bbcdeea8ed63df412da9"),
// ); );
// assert_eq!( assert_eq!(
// md4::hash(&Bytes::from_utf8("abcdefghijklmnopqrstuvwxyz")), md4::hash(&Bytes(vec![b'a'; 1337])),
// Bytes::from_hex("d79e1c308aa5bbcdeea8ed63df412da9"), Bytes::from_hex("9a4bceae0ae389c4653ad92cfd7bfc3e"),
// ); );
// assert_eq!(
// md4::hash(&Bytes::from_utf8( // extend MD4 copy and pasted from SHA-1 #allow!(dont-repeat-yourself)
// "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789" fn hash_fixated(bytes: &Bytes, fixture: &Bytes, byte_len: u64) -> Bytes {
// )), let mut m = md4::Md4Core::default();
// Bytes::from_hex("043f8582f241db351ce627e153e7f0e4"), let fixate: Vec<u32> = fixture
// ); .0
// assert_eq!( .chunks(4)
// md4::hash(&Bytes::from_utf8( .map(|c| u32::from_le_bytes(c.try_into().unwrap()))
// "12345678901234567890123456789012345678901234567890123456789012345678901234567890" .collect();
// )), m.fix(fixate.try_into().unwrap(), byte_len);
// Bytes::from_hex("e33b4ddc9c38f2199c3e7b164fcc0536"), m.hash(&bytes)
// ); }
println!("[xxxx] Challenge 30: tbd");
let key = Bytes::random_range(2, 64);
let message = Bytes::from_utf8(
"comment1=cooking%20MCs;userdata=foo;comment2=%20like%20a%20pound%20of%20bacon",
);
let mac = md4::authenticate(&message, &key);
assert!(md4::verify(&message, &key, &mac));
let mut forged_message = vec![];
let mut mac_forged = Bytes(vec![]);
for key_len in 1..128 {
// get padding for key || orig-message
let key_guessed = vec![b'z'; key_len]; // key-guessed
let mut bytes = key_guessed.to_vec();
bytes.append(&mut message.0.to_vec()); // original-message
let md4 = md4::Md4Core::default();
let glue_padding = md4.get_padding(&bytes); // glue-padding
// forget MAC via fixture: make sure to fix md4.state *and* md4.byte_length
let byte_length = (key_guessed.len() + message.len() + glue_padding.len()) as u64;
let new_message = b"admin=true".to_vec(); // new-message
mac_forged = hash_fixated(&Bytes(new_message.to_vec()), &mac, byte_length);
// forge message: original-message || glue-padding || new-message
forged_message = message.0.to_vec();
forged_message.append(&mut glue_padding.to_vec());
forged_message.append(&mut new_message.to_vec());
let r = md4::verify(&Bytes(forged_message.to_vec()), &key, &mac_forged);
if r {
break;
}
}
assert!(md4::verify(&Bytes(forged_message), &key, &mac_forged));
println!("[okay] Challenge 30: implemented and extended MD4 successfully");
}
pub fn challenge31() {
println!("[xxxx] Challenge 31: tbd");
} }

View File

@@ -16,7 +16,13 @@ impl Default for Sha1 {
#[inline] #[inline]
fn default() -> Self { fn default() -> Self {
Self { Self {
h: [ 0x6745_2301, 0xEFCD_AB89, 0x98BA_DCFE, 0x1032_5476, 0xC3D2_E1F0, ], h: [
0x6745_2301,
0xEFCD_AB89,
0x98BA_DCFE,
0x1032_5476,
0xC3D2_E1F0,
],
byte_len: 0, byte_len: 0,
} }
} }
@@ -44,46 +50,51 @@ fn blk(block: &Block, i: usize) -> u32 {
} }
fn r0(block: &Block, v: u32, w: &mut u32, x: u32, y: u32, z: &mut u32, i: usize) { fn r0(block: &Block, v: u32, w: &mut u32, x: u32, y: u32, z: &mut u32, i: usize) {
*z = z.wrapping_add((*w & (x ^ y)) ^ y) *z = z
.wrapping_add(block[i]) .wrapping_add((*w & (x ^ y)) ^ y)
.wrapping_add(0x5a82_7999) .wrapping_add(block[i])
.wrapping_add(rol(v, 5)); .wrapping_add(0x5a82_7999)
.wrapping_add(rol(v, 5));
*w = rol(*w, 30); *w = rol(*w, 30);
} }
fn r1(block: &mut Block, v: u32, w: &mut u32, x: u32, y: u32, z: &mut u32, i: usize) { fn r1(block: &mut Block, v: u32, w: &mut u32, x: u32, y: u32, z: &mut u32, i: usize) {
block[i] = blk(block, i); block[i] = blk(block, i);
*z = z.wrapping_add((*w & (x ^ y)) ^ y) *z = z
.wrapping_add(block[i]) .wrapping_add((*w & (x ^ y)) ^ y)
.wrapping_add(0x5a82_7999) .wrapping_add(block[i])
.wrapping_add(rol(v, 5)); .wrapping_add(0x5a82_7999)
.wrapping_add(rol(v, 5));
*w = rol(*w, 30); *w = rol(*w, 30);
} }
fn r2(block: &mut Block, v: u32, w: &mut u32, x: u32, y: u32, z: &mut u32, i: usize) { fn r2(block: &mut Block, v: u32, w: &mut u32, x: u32, y: u32, z: &mut u32, i: usize) {
block[i] = blk(block, i); block[i] = blk(block, i);
*z = z.wrapping_add(*w ^ x ^ y) *z = z
.wrapping_add(block[i]) .wrapping_add(*w ^ x ^ y)
.wrapping_add(0x6ed9_eba1) .wrapping_add(block[i])
.wrapping_add(rol(v, 5)); .wrapping_add(0x6ed9_eba1)
.wrapping_add(rol(v, 5));
*w = rol(*w, 30); *w = rol(*w, 30);
} }
fn r3(block: &mut Block, v: u32, w: &mut u32, x: u32, y: u32, z: &mut u32, i: usize) { fn r3(block: &mut Block, v: u32, w: &mut u32, x: u32, y: u32, z: &mut u32, i: usize) {
block[i] = blk(block, i); block[i] = blk(block, i);
*z = z.wrapping_add(((*w | x) & y) | (*w & x)) *z = z
.wrapping_add(block[i]) .wrapping_add(((*w | x) & y) | (*w & x))
.wrapping_add(0x8f1b_bcdc) .wrapping_add(block[i])
.wrapping_add(rol(v, 5)); .wrapping_add(0x8f1b_bcdc)
.wrapping_add(rol(v, 5));
*w = rol(*w, 30); *w = rol(*w, 30);
} }
fn r4(block: &mut Block, v: u32, w: &mut u32, x: u32, y: u32, z: &mut u32, i: usize) { fn r4(block: &mut Block, v: u32, w: &mut u32, x: u32, y: u32, z: &mut u32, i: usize) {
block[i] = blk(block, i); block[i] = blk(block, i);
*z = z.wrapping_add(*w ^ x ^ y) *z = z
.wrapping_add(block[i]) .wrapping_add(*w ^ x ^ y)
.wrapping_add(0xca62_c1d6) .wrapping_add(block[i])
.wrapping_add(rol(v, 5)); .wrapping_add(0xca62_c1d6)
.wrapping_add(rol(v, 5));
*w = rol(*w, 30); *w = rol(*w, 30);
} }
@@ -191,11 +202,11 @@ impl Sha1 {
r4(block, b, &mut c, d, e, &mut a, 15); r4(block, b, &mut c, d, e, &mut a, 15);
/* Add the working vars back into digest[] */ /* Add the working vars back into digest[] */
self.h[0] += a; self.h[0] = self.h[0].wrapping_add(a);
self.h[1] += b; self.h[1] = self.h[1].wrapping_add(b);
self.h[2] += c; self.h[2] = self.h[2].wrapping_add(c);
self.h[3] += d; self.h[3] = self.h[3].wrapping_add(d);
self.h[4] += e; self.h[4] = self.h[4].wrapping_add(e);
/* Count the number of transformations */ /* Count the number of transformations */
self.byte_len += BLOCK_BYTES as u64; self.byte_len += BLOCK_BYTES as u64;
@@ -219,9 +230,9 @@ impl Sha1 {
} }
// append the original message length as a 64-bit big-endian integer // append the original message length as a 64-bit big-endian integer
let bits: u64 = (self.byte_len + bytes.len() as u64) as u64 * 8; let bit_len: u64 = (self.byte_len + bytes.len() as u64) as u64 * 8;
padding.append(&mut ((bits >> 32) as u32).to_be_bytes().to_vec()); padding.append(&mut ((bit_len >> 32) as u32).to_be_bytes().to_vec());
padding.append(&mut (bits as u32).to_be_bytes().to_vec()); padding.append(&mut (bit_len as u32).to_be_bytes().to_vec());
padding padding
} }