# Welcome ๐

Hello, I’m Hyunsik Jeong a.k.a. RBTree. I mainly write articles related to cryptography, reverse engineering, and other CTF/security-related stuffs here.

## Interpolation Attack

I made one crypto challenge each for CODEGATE CTF 2022 quals and finals. In this article, Iโm gonna explain how the interpolation attack works, and show the way to solve my challenge โHidden Command Serviceโ from the finals. Interpolation Attack Once upon a time, there was a dangerous attack technique called โdifferential cryptanalysisโโฆ Then, two crypto-magicians made a scheme which is provably safe from the differential cryptanalysis, called KN-Cipher. However, it soon turned out that the structure of S-boxes used in those ciphers are vulnerable to a new attack called โinterpolation attackโ, and a variant of KN-Cipher called PURE is broken....

2022-11-07 ยท 10 min ยท RBTree

## Cube Attack

I made one crypto challenge each for CODEGATE CTF 2022 quals and finals. In this article, Iโm gonna explain how the cube attack works, and show the way to solve my challenge โHappy S-boxโ from the quals. Cube Attack Consider a multivariate equation over $\text{GF}(2)$, $f(x_1, \dots, x_n)$. There will be multiple monomials in $f$, and what we want to do is to pick one monomial $g = x_{i_1}x_{i_2} \cdots x_{i_k}$ and divide $f$ by $g$....

2022-11-07 ยท 6 min ยท RBTree

## ์ ๋ฌธ์ฐ๊ตฌ์์์ ์ํ ํ๋ จ์ ์ค๋น๋ฌผ ๋ฐ ํ

2022๋ 7์ 7์ผ์ ํ๋ จ์์ ์์ํด์ 7์ 28์ผ์ ํด์ํ์ต๋๋ค. ๋คํํ๋ ์ข์ ์ฌ๋๋ค๊ณผ ๊ฐ์ ๋ถ๋์์ ์ํํด์ ์ ์ง๋ผ ์ ์์์ต๋๋ค. ์ด ๊ธ์์๋ ๊ฐ์ธ์ ์ผ...

2022-07-31 ยท 6 min ยท RBTree

## Posts from the Samsung Software Membership blog

Finally, I copied my posts from the Samsung Software Membership blog. Those are not translated yet. I hope I can finish the translation someday. ๐ข๐ข๐ข Digital Signatures and Nonce Reuse Shellcoding and Bitflip Conjecture Smooth numbers and Factorization On Factoring Given Any Bits Forgery Attack on ElGamal Signatures How to build WebAssembly apps with Rust AntiVirus Oracle Singular Elliptic Curves Anomalous Elliptic Curves SMT Solvers in CTF -...

2022-04-26 ยท 1 min ยท RBTree

## SageMath script for AES-GCM challenges

There was an interesting challenge about AES-GCM in LINE CTF 2022, called โlazy STEK.' Iโm not gonna talk about the challenge itself. When I was solving this challenge, I realized that I did not save a script to convert between byte blocks and $\mathbb{F}_{2^{128}}$ elements in SageMath. As it is a bit confusing to understand how the conversion works, I share my script with the solution of lazy STEK here for someone struggling with this problem....

2022-03-27 ยท 2 min ยท RBTree