سبحان الله و بحمده سبحان الله العظيم ❤️

← BACK TO WRITEUPS
Algebra CryptoHack EXTREME

Quo Vadis — Galois Ring Isomorphism Attack

Protocol over Galois Rings GR(2^k, D) — 5 stages

Challenge

Two representations of the same Galois ring (R₁ tower extension, R₂ single extension). A secret polynomial P(x) is evaluated at a random point pt₁ ∈ R₁. We submit pt₂ ∈ R₂, get P(pt₂), and must recover coefficients of P(pt₁) in R₁.

StagekExtensionsDegree
12[2,3]6
28[2,3]6
38[2,3,5]30
432[3,4,5]60
564[4,3,5]60

Mathematical Foundation

Since R₁ ≅ R₂, let φ: R₁ → R₂ be the isomorphism. Setting pt₂ = φ(pt₁), the server gives coefficients of y = φ(P(pt₁)). This reduces to solving M·x = y (mod 2^k) where M is the matrix representing φ.

Flag

ECSC{1s0m0rph1sms_w1th_0ur_0ld_fr13nd_Evariste_8beb83d57fb48ea1}