Cryptographic Hash Function Design (Or, How to Shoot Yourself in the Foot Very Badly)
David Wilson
Fri Jan 8, 07:30-10:30pm, 56-114
No enrollment limit, no advance sign up
Single session event
Prereq: Familiarity with programming (especially bitwise operations)
Cryptographic hash functions are used in many different applications--on their own, and as building blocks for more complicated protocols. Come learn how they actually work inside (and why you should never, ever try to implement them yourself).
This course will describe what sorts of properties are desirable in cryptographic hash functions, a few techniques for achieving these properties, and what is actually done in practice. In-depth attention will be given to the MD4 family (which includes MD5 and SHA-1, among others). Time permitting, an overview of the design of selected SHA-3 candidates will also be given.
Web: http://sipb.mit.edu/iap/hash
Contact: David Wilson, dwilson@mit.edu
Sponsor: Student Information Processing Board
Cosponsor: Electrical Engineering and Computer Science
Latest update: 08-Jan-2010
|
|