Practical Start Collision Attacks on the 76 Step SHA-1

Practical Start Collision Attacks on the 76 Step SHA-1

TheIACR via YouTube Direct link

Snippets in a picture

23 of 24

23 of 24

Snippets in a picture

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Practical Start Collision Attacks on the 76 Step SHA-1

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Three security notions (informal)
  3. 3 Merkle Damgård hash functions
  4. 4 Additional security notions for MD
  5. 5 What did we do?
  6. 6 The SHA-1 hash function
  7. 7 SHA-1 compression function
  8. 8 Round function in a picture
  9. 9 Wang collisions
  10. 10 Preimage detour
  11. 11 The point of free-start
  12. 12 The point of free start in a picture
  13. 13 Sooo, what do we need to do?
  14. 14 Linear part selection
  15. 15 Linear path in a picture (part 1/2)
  16. 16 Non-linear part construction
  17. 17 Non-linear path in a picture
  18. 18 Accelerating techniques
  19. 19 Let's sum up
  20. 20 Same thing in a picture
  21. 21 Let's use a GPU!
  22. 22 Architecture imperatives
  23. 23 Snippets in a picture
  24. 24 GPU results

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.