Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the collision security of Tandem-DM in the Ideal Cipher Model through this 20-minute talk from Crypto 2011. Delve into the research by Martijn Stam, Joojoung Lee, and John Steinberger as they present their findings on this cryptographic topic. Begin with an introduction to the Ideal Cipher Model and query history before evaluating Tandem-DM and analyzing collisions within it. Examine various cases, including when the last query is TL and backward or forward, and understand the concept of a modified adversary A'. Gain insights into the properties of the modified adversary and discover the main results of this cryptographic analysis.
Syllabus
Intro
Ideal Cipher Model & Query History
Evaluation of Tandem-DM
Collisions in Tandem-DM
Case Analysis
Upper bounding Pr Coll (2)
Case 1: The Last Query is TL and Backward At the point when TL is queried, BL Rare fixed
Case 2: The Last Query is TL and Forward
Main Idea: Modified Adversary A'
The Property of the Modified Adversary
Main Result
Taught by
TheIACR