Crypto - Taaffeite Encryption
I heard that post-quantum cryptosystems are secure. So even your quantum computer can't break this one. -Nilabha Saha
Last updated
I heard that post-quantum cryptosystems are secure. So even your quantum computer can't break this one. -Nilabha Saha
Last updated
Let's look at how the data is being encrypted.
The function gen_small_vect()
generates vectors of the size 3 which have degree 256 but coefficients in the range {0,2}.
We are given a pair of ciphertexts, which are a combination of error terms and small vectors and noisy_s term.
First, let us try to get the value of s from noisy_s
Now that we have the value of s,we can now try to find an equation that gives us the value of f (possibly with some error terms).
Let's compare how the equation and flag looks like
Although the degrees of the two terms are different, we can map values close to 1665 as 1 and values far from it as 0 to get the same set of values as the flag in the same interval.
We are given a file, in which we find the ciphertexts and noisy_s . The error terms and noisy data makes it look like a problem.
The flag is constructed into a polynomial form from its bits, for 1 and 0 otherwise and is multiplied by p//2+1
The only coefficients, in noisy_s are 1479 and 2958. This is because s is generated from gen_small_vect()
which only has coefficients {0,2} so we can conclude .
We can find the value of s by multiplying noise_s by