Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

SHA-1 Backdooring and Exploitation

via YouTube

Overview

Explore the intricacies of SHA-1 backdooring and exploitation techniques in this informative 29-minute conference talk from BSidesLV 2014. Delve into the world of cryptographic vulnerabilities as Jean-Philippe Aumasson presents insights on potential weaknesses in the SHA-1 hash function and discusses methods for exploiting these vulnerabilities. Gain valuable knowledge about the security implications of SHA-1 and learn about potential backdooring techniques that could compromise its integrity.

Syllabus

cg00 sha 1 backdooring and exploitation jean philippe aumasson

Reviews

Start your review of SHA-1 Backdooring and Exploitation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.