YoVDO

Kill MD5 - Demystifying Hash Collisions

Offered By: Cooper via YouTube

Tags

Conference Talks Courses Cybersecurity Courses Cryptography Courses Data Integrity Courses

Course Description

Overview

Explore the intricacies of hash collisions and delve into the vulnerabilities of the MD5 algorithm in this enlightening 30-minute conference talk. Gain insights into identical prefixes and two-prefix techniques, understand the specific weaknesses of MD5, and discover why the speaker finds this topic fascinating. Conclude with a comprehensive overview of the implications and importance of hash collision research in cryptography and cybersecurity.

Syllabus

Intro
Identical prefix
Two prefix
What about MD5
Why I like it so much
Conclusion


Taught by

Cooper

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera