How We Created the First SHA-1 Collision and What it Means for Hash Security
Offered By: Black Hat via YouTube
Course Description
Overview
Syllabus
Intro
What is a cryptographic hash function?
What are secure hash functions used for?
Second preimage attack
The need for cryptanalysis
The Merkle-Damgård construction
Unrolled SHA-1 compress function
SHA-1 cryptanalysis in a nutshell
Two block collision
Fixed prefix attack (SHA-1)
Carefully choosing prefix to improve attack
Chosen-prefix: MDS SSL certificate forgery
Malware MD5 certificate
Attack feasibility
Attack overview
Smart prefix: JPEG embedded in PDF
Scaling computation
Developing the full collision attack
Making efficient use of GPUs
Phase 2 production rate per step
Computational cost comparison
Counter-cryptanalysis to the rescue!
GIT is using SHA-1 for foreseeable future
Mitigating GIT issues with counter-cryptanalysis
Google scans incoming documents
Why scan files for collision?
Gmail counter-cryptanalysis cost
The future of hash security is diversity
Takeaways
Taught by
Black Hat
Related Courses
Internetwork SecurityIndian Institute of Technology, Kharagpur via Swayam Classical Cryptosystems and Core Concepts
University of Colorado System via Coursera Cryptography and Information Theory
University of Colorado System via Coursera Cryptography And Network Security
Indian Institute of Technology, Kharagpur via Swayam An Introduction to Cryptography
Coventry University via FutureLearn