New Approaches for Building Cryptographic Hash Functions
Cryptographic hash functions are a fundamental primitive, utilized in numerous security applications. With the recent attacks against many widely deployed ha...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Pakistan under the topic 'f'.
About this video
Cryptographic hash functions are a fundamental primitive, utilized in numerous security applications. With the recent attacks against many widely deployed hash functions (e.g., MD5, SHA-1), the search is on for new, secure hash functions to re-establish security of all the various protocols that rely on them. At the same time, hash functions like SHA-1 have seen expanded usage into applications that demand security properties not handled by traditional design approaches. In this talk, I'll discuss the traditional design setting for hash functions, investigate the insufficiency of proposed design approaches, and introduce our new approach, which enables building a single hash function with strong security guarantees for multiple applications. Beyond the traditional design setting, there exists another in which hash functions have dedicated-keys. I'll highlight some of the benefits and downsides of working in this setting and, as before, propose approaches for this setting that allow building hash functions secure in a broad sense. Joint work with Mihir Bellare
Video Information
Views
114
Total views since publication
Likes
1
User likes and reactions
Duration
56:32
Video length
Published
Sep 6, 2016
Release date
Quality
sd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.