Completed
Two block collision
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
How We Created the First SHA-1 Collision and What it Means for Hash Security
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 What is a cryptographic hash function?
- 3 What are secure hash functions used for?
- 4 Second preimage attack
- 5 The need for cryptanalysis
- 6 The Merkle-Damgård construction
- 7 Unrolled SHA-1 compress function
- 8 SHA-1 cryptanalysis in a nutshell
- 9 Two block collision
- 10 Fixed prefix attack (SHA-1)
- 11 Carefully choosing prefix to improve attack
- 12 Chosen-prefix: MDS SSL certificate forgery
- 13 Malware MD5 certificate
- 14 Attack feasibility
- 15 Attack overview
- 16 Smart prefix: JPEG embedded in PDF
- 17 Scaling computation
- 18 Developing the full collision attack
- 19 Making efficient use of GPUs
- 20 Phase 2 production rate per step
- 21 Computational cost comparison
- 22 Counter-cryptanalysis to the rescue!
- 23 GIT is using SHA-1 for foreseeable future
- 24 Mitigating GIT issues with counter-cryptanalysis
- 25 Google scans incoming documents
- 26 Why scan files for collision?
- 27 Gmail counter-cryptanalysis cost
- 28 The future of hash security is diversity
- 29 Takeaways