Completed
Attack Procedure
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Cryptanalyses on a Merkle-Damgård Based MAC
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Summary
- 3 Outline
- 4 Message Authentication Code
- 5 Hash Function
- 6 Secret Prefix
- 7 Security Proof
- 8 Attack Framework
- 9 Previous Approach
- 10 Generic Approach Results
- 11 Basic Idea
- 12 Internal Cohesion
- 13 Range Simulation
- 14 Attack Procedure
- 15 Almost universal forgery attack
- 16 The idea
- 17 Potential applications
- 18 Diamond structure
- 19 Generic distinction
- 20 Future research directions