YoVDO

Kill MD5 - Demystifying Hash Collisions

Offered By: Cooper via YouTube

Tags

Conference Talks Courses Cybersecurity Courses Cryptography Courses Data Integrity Courses

Course Description

Overview

Explore the intricacies of hash collisions and delve into the vulnerabilities of the MD5 algorithm in this enlightening 30-minute conference talk. Gain insights into identical prefixes and two-prefix techniques, understand the specific weaknesses of MD5, and discover why the speaker finds this topic fascinating. Conclude with a comprehensive overview of the implications and importance of hash collision research in cryptography and cybersecurity.

Syllabus

Intro
Identical prefix
Two prefix
What about MD5
Why I like it so much
Conclusion


Taught by

Cooper

Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube