The Collision Security of Tandem-DM in the Ideal Cipher Model
Offered By: TheIACR via YouTube
Course Description
Overview
Explore the collision security of Tandem-DM in the Ideal Cipher Model through this 20-minute talk from Crypto 2011. Delve into the research by Martijn Stam, Joojoung Lee, and John Steinberger as they present their findings on this cryptographic topic. Begin with an introduction to the Ideal Cipher Model and query history before evaluating Tandem-DM and analyzing collisions within it. Examine various cases, including when the last query is TL and backward or forward, and understand the concept of a modified adversary A'. Gain insights into the properties of the modified adversary and discover the main results of this cryptographic analysis.
Syllabus
Intro
Ideal Cipher Model & Query History
Evaluation of Tandem-DM
Collisions in Tandem-DM
Case Analysis
Upper bounding Pr Coll (2)
Case 1: The Last Query is TL and Backward At the point when TL is queried, BL Rare fixed
Case 2: The Last Query is TL and Forward
Main Idea: Modified Adversary A'
The Property of the Modified Adversary
Main Result
Taught by
TheIACR
Related Courses
Requirements Specifications: Goals and Conflict AnalysisUniversity of Colorado System via Coursera Threat and Vulnerability Management for CompTIA CySA+
Pluralsight Network Security Monitoring (NSM) with Security Onion
Pluralsight Security Event Triage: Operationalizing Security Analysis
Pluralsight Complete Guide to Elasticsearch
Udemy