Explore the intricacies of attacking hash functions in cryptographic schemes in this 43-minute lecture by Christian Majenz from the University of Amsterdam. Delve into the world of quantum cryptanalysis of post-quantum cryptography, covering topics such as the quantum random oracle model, domain extension, and the sponge construction. Examine hash functions in the NIST competition and learn various attack strategies. Investigate Sigma protocols, the Flat Shamir transformation, Fiat-Shamir signature scheme, and the Fujisaki Okamoto transformation. Gain insights into zero knowledge proofs and the uninstantiability of the QROM. Conclude with a comprehensive summary of the presented concepts and their implications for modern cryptography.
On Attacking Hash Functions in Cryptographic Schemes