Instructions on how to submit Lab 1: Please download all the required files from the lab1 github repo.

  • Code: Place your code answers in the template attack.py. Please include all code necessary to generate your solution in each of the respective methods. Do not just hard code working answers!

  • Text: Answer the written questions in the lab1 questions gradescope assignment. There are both warm-up excercises and theory questions at the end of the lab.

Upload attack.py to the lab1 code gradescope assignment.

Running the Lab on Windows make check and make run-server and make venv do not natively work on Windows.

If you are using a windows machine, please see the Windows Instructions.

Gradescope autograder: Your code will be graded with the Gradescope autograder with a total timeout of 40 minutes.

There is a STRICT 6.0GB memory limit on Gradescope. Reasonable solutions to this lab should not come close to approaching this memory limit.

Plagiarism: Gradescope automatically runs a surprisingly effective plagiarism-detection tool on your submissions. Please do not copy code from your fellow students. Refer to the “Collaboration” section of the course info document for details on what types of collaboration are and aren’t allowed in 6.1600. If you are having trouble completing an assignment for whatever reason, please ask the course staff for help. We are often happy to give help and, in many cases, extensions too! We are not happy when we find copied code.

Optional reference reading: The Boneh-Shoup book, Chapter 8.9 presents a formal treatment of Merkle trees and authenticated data structures, if you would like a more detailed discussion of the ideas behind this lab assignment.


WARNING: The code for this lab requires Python 3.10 or higher. (The code will not run with older versions of Python.) Please make sure to upgrade before attempting to run the code.

In this lab assignment, you will attack an authenticated key-value store that uses Merkle trees. The code is available in the lab1 github repo.

The key-value store consists of two parts: a store that stores key-value pairs, and a client that can perform get and put operations. The client can look up the current value of a key, or put a new value for a particular key. The client doesn’t store the key-value pairs itself, and relies on the store for that purpose. Importantly for this lab, though, the client tries to ensure that the store is behaving correctly, using a Merkle tree.

Warm-up exercises

To get familiar with the key-value store used in this lab, experiment with it using the command-line interface. Run make venv to set up the Python environment with the required packages. Then, start the store server by running make run-server. Finally, in another terminal, use venv/bin/python cli.py to issue put and get requests to the server, like:

    % venv/bin/python cli.py get foo
    % venv/bin/python cli.py get hello
    % venv/bin/python cli.py put foo bar
    % venv/bin/python cli.py put hello world
    % venv/bin/python cli.py get foo
    % venv/bin/python cli.py get hello
    ...

Answer the following questions in the gradescope assignment:

  1. When you restart the server (kill the running server and run make run-server again), what happens to subsequent client lookups (get operations)? How does the client know that the server restarted?

    Hint: if you get the client and server in an inconsistent state after restarting the server, you can use venv/bin/python cli.py reset to get yourself back to a clean starting state again.

  2. Why do subsequent client updates (put operations) fail to execute after a server restart? What would go wrong if they didn’t fail?

Merkle tree implementation

For the rest of this lab assignment, you will need to understand the exact way in which our code authenticates key-value operations. The way the client authenticates the store’s responses is by constructing a tree of the current key-value mappings, and building a Merkle hash tree for that key-value tree. An example Merkle tree is shown in this figure:

Merkle tree diagram

You can see the code for this construction in common.py. A is the root of the tree in the example diagram. Each subtree (including the leaf nodes at the bottom, the intermediate nodes in the tree, and the root node) is represented by some byte string:

  • A leaf node with a single key-value pair, such as the D, E, and F nodes, is represented by H_kv() (the hash of the concatenation of the key and the value, such as the concatenation of foo and bar for the D node).

  • An intermediate tree node is represented by H_internal() (the hash of the concatenation of the left and right subtree representations). For instance, the B node is represented by the hash of the concatenation of the hashes for D and E, in that order, and A is the hash of the concatenation of the hashes for B and C.

  • An empty subtree is represented by H_empty() (an empty string). This shows up in cases when an internal node has only one child (e.g., C has only a right child, so its left child is the empty subtree, represented by H_empty()). A tree containing no elements has an empty root, so the root (and thus the entire tree) would be represented by H_empty().

The client stores the root value, and uses that to authenticate all operations on the tree.

To find a given key-value pair, the client traverses the tree going left and right based on the hash of the key that it wants to find, traversal_path(key), which is the hash of the key. That is, each key has a specific place where it can be found in the tree. However, a tree does not need to be expanded all the way to the depth of traversal_path(), if there aren’t other keys with similar prefixes of their traversal_path(). In our example tree diagram above, the high bit in the hash of foo and baz are both 0, so they are both on the left side of the root. The next-highest bit in the hash of foo is 0 and the same bit in the hash of baz is 1, which is why foo is on the left of node B, and baz is on the right. The high two bits of the hash of abc are both 1, which is why it’s on the right side. There is no requirement for the tree to be in a minimal shape; for instance, the key-value pair for abc could have appeared in the C node, without expanding the tree down one more level.

You can use the --print-proofs command to ask the client to explicitly print out the steps of proof verification, to help understand how the client authenticates the responses it gets from the store. For example:

    % venv/bin/python cli.py reset
    % venv/bin/python cli.py put foo bar
    % venv/bin/python cli.py put hello world
    % venv/bin/python cli.py --print-proofs get foo

Answer the following questions in the gradescope assignment:

  1. How many siblings are included in the proof to verify the node for get foo after you’ve inserted both foo=bar and hello=world into the store, as in the above example? Explain why that is.

Attack scenario 1: Key-value confusion

For this and subsequent attack assignments, your job will be to find weaknesses in this authentication scheme. You can look at client.py and store.py to understand how these two components work in detail.

  1. Find a weakness in the authentication scheme that allows an adversarial store to produce a fake key-value pair that will appear to be valid to a client (i.e., get succeeds), after the client inserts just one valid key-value pair of its own choice (hello, world).

    We formalize this attack scenario in the code of scenario_one() in grader.py. The client inserts a key-value pair (hello, world), and then the client starts interacting with the adversarial store (c._store = a), and the adversary gets to supply a fake key of the adversary’s choice (a.attack_fake_key()).

    Implement your attack by modifying AttackOne in attack.py. Run make check to check if your attack works.

Attack scenario 2: Many fake key-value pairs

Consider the scenario in scenario_two() of grader.py: the client inserts a single key-value pair of the adversary’s choice (a.attack_key_value()), and the adversary’s job is to make it so that many key-value lookups will then succeed on the client (all of the keys in a.attack_fake_keys() must appear to exist).

  1. Find a weakness in the authentication scheme that allows an adversary to mount an attack against scenario 2.

    Implement your attack by modifying AttackTwo in attack.py. Run make check to check if your attack works.

Attack scenario 3: Fake proofs

Consider the scenario in scenario_three() of grader.py: the grader inserts many keys, k0 through k999, into the store. Your job, in AttackThree, is to create fake proofs that convince the client that all of those keys are missing (i.e., lookup() should return None). To make this attack slightly more challenging, and to also prepare you for the next attack, you must construct fake proofs with a single element in the proof.siblings list.

  1. Find a weakness in the authentication scheme that allows an adversary to mount an attack against scenario 3.

    Implement your attack by modifying AttackThree in attack.py. Run make check to check if your attack works.

Attack scenario 4: Insert confusion (Optional, extra credit)

Consider the scenario in scenario_four() of grader.py: the client inserts 1000 short key-value pairs of the client’s choice, while interacting with the adversary’s store. (Previously all of the client inserts took place against the real key-value store.) The client then gets a key from the adversary, which should appear to exist (get succeeds), and the resulting key-value pair should be long (over 1000 bytes).

It might be helpful to understand how the client checks proofs when doing an insert. Use cli.py to experiment with this; for example:

    % venv/bin/python cli.py reset
    % venv/bin/python cli.py --print-proofs put foo bar
    % venv/bin/python cli.py --print-proofs put hello world
    % venv/bin/python cli.py --print-proofs get hello

    % venv/bin/python cli.py --print-proofs put abc def
    % venv/bin/python cli.py --print-proofs get abc

What proof is being presented for each put operation? How does the proof presented for put hello world compare with the proof presented for get hello? What about for abc? You don’t have to submit answers to these questions, but understanding how this works will likely help you implement the attack for scenario 4.

  1. Find a weakness in the authentication scheme that allows an adversary to mount an attack against scenario 4.

    Implement your attack by modifying AttackFour in attack.py. Run make check to check if your attack works.

Theory Questions

Answer all of the theory questions on gradescope.