YoVDO

The Collision Security of Tandem-DM in the Ideal Cipher Model

Offered By: TheIACR via YouTube

Tags

Cryptography Courses Security Analysis Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the collision security of Tandem-DM in the Ideal Cipher Model through this 20-minute talk from Crypto 2011. Delve into the research by Martijn Stam, Joojoung Lee, and John Steinberger as they present their findings on this cryptographic topic. Begin with an introduction to the Ideal Cipher Model and query history before evaluating Tandem-DM and analyzing collisions within it. Examine various cases, including when the last query is TL and backward or forward, and understand the concept of a modified adversary A'. Gain insights into the properties of the modified adversary and discover the main results of this cryptographic analysis.

Syllabus

Intro
Ideal Cipher Model & Query History
Evaluation of Tandem-DM
Collisions in Tandem-DM
Case Analysis
Upper bounding Pr Coll (2)
Case 1: The Last Query is TL and Backward At the point when TL is queried, BL Rare fixed
Case 2: The Last Query is TL and Forward
Main Idea: Modified Adversary A'
The Property of the Modified Adversary
Main Result


Taught by

TheIACR

Related Courses

Requirements Specifications: Goals and Conflict Analysis
University of Colorado System via Coursera
Threat and Vulnerability Management for CompTIA CySA+
Pluralsight
Network Security Monitoring (NSM) with Security Onion
Pluralsight
Security Event Triage: Operationalizing Security Analysis
Pluralsight
Complete Guide to Elasticsearch
Udemy