YoVDO

The Collision Security of Tandem-DM in the Ideal Cipher Model

Offered By: TheIACR via YouTube

Tags

Cryptography Courses Security Analysis Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the collision security of Tandem-DM in the Ideal Cipher Model through this 20-minute talk from Crypto 2011. Delve into the research by Martijn Stam, Joojoung Lee, and John Steinberger as they present their findings on this cryptographic topic. Begin with an introduction to the Ideal Cipher Model and query history before evaluating Tandem-DM and analyzing collisions within it. Examine various cases, including when the last query is TL and backward or forward, and understand the concept of a modified adversary A'. Gain insights into the properties of the modified adversary and discover the main results of this cryptographic analysis.

Syllabus

Intro
Ideal Cipher Model & Query History
Evaluation of Tandem-DM
Collisions in Tandem-DM
Case Analysis
Upper bounding Pr Coll (2)
Case 1: The Last Query is TL and Backward At the point when TL is queried, BL Rare fixed
Case 2: The Last Query is TL and Forward
Main Idea: Modified Adversary A'
The Property of the Modified Adversary
Main Result


Taught by

TheIACR

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera