YoVDO

SHA-1 Backdooring and Exploitation

Offered By: YouTube

Tags

Cryptography Courses Cybersecurity Courses Hash Functions Courses Cryptographic Vulnerabilities Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of SHA-1 backdooring and exploitation techniques in this informative 29-minute conference talk from BSidesLV 2014. Delve into the world of cryptographic vulnerabilities as Jean-Philippe Aumasson presents insights on potential weaknesses in the SHA-1 hash function and discusses methods for exploiting these vulnerabilities. Gain valuable knowledge about the security implications of SHA-1 and learn about potential backdooring techniques that could compromise its integrity.

Syllabus

cg00 sha 1 backdooring and exploitation jean philippe aumasson


Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera