Главная
Study mode:
on
1
Intro
2
Hash Functions are Useful
3
Hash Implementation Can Be Optimized
4
Common Deployment
5
Subversion Attack
6
A Crafty Subversion
7
Chain Takeover Attack
8
The Crooked Hash
9
Goal: Repair Subverted Hash
10
Correcting Subverted ROs 1: Modeling
11
Rationale Behind
12
Correcting Subverted ROs III: Analysis
13
Two Challenges Remain
14
A New Machinery: Rejection Resampling Lemma
15
The Final Construction and Analysis
16
Preventing Chain Takeover
17
Reflections
18
Open Problems
Description:
Explore a presentation from Crypto 2018 on correcting subverted random oracles, delving into the vulnerabilities of hash functions and proposed solutions. Learn about hash implementation optimization, subversion attacks, chain takeover attacks, and methods to repair compromised hash functions. Examine the modeling and analysis of correcting subverted random oracles, including the rejection resampling lemma and final construction. Gain insights into preventing chain takeovers and consider open problems in this critical area of cryptography.

Correcting Subverted Random Oracles

TheIACR
Add to list
0:00 / 0:00