this iS not PN
CRYPTO
2 files available
Description
I'm a symmetric cryptography expert and I think permutation networks are always impossible to break, no matter what components are used.
Solution
Analysis
The user is provided with the encryption of the flag after 5 rounds and 6 rounds. Why? With 5 rounds the first half of the flag can be found, whilst the second half can be found by exploiting the 6 rounds ciphertext. The goal is to write the equations for both the instances and find some relations that can help to obtain the desired blocks.
The cipher
Given a key , each round of the cipher works as shown by the following image:
Where, given a key , the function is defined as . For ease of notation, .
The relations
From the 5 round instance:
From the 6 round instance:
Flag
The flag is the concatenation of and .
Code
Here is the solver code.