IAP Independent Activities Period
overview participate organize offerings calendar  
for-credit subjects non-credit activities by category non-credit activities by sponsor non-credit activities by date

IAP 2010 Activity


Cryptographic Hash Function Design (Or, How to Shoot Yourself in the Foot Very Badly)
David Wilson
Fri Jan 8, 07:30-10:30pm, 56-114

No enrollment limit, no advance sign up
Single session event
Prereq: Familiarity with programming (especially bitwise operations)

Cryptographic hash functions are used in many different applications--on their own, and as building blocks for more complicated protocols. Come learn how they actually work inside (and why you should never, ever try to implement them yourself).

This course will describe what sorts of properties are desirable in cryptographic hash functions, a few techniques for achieving these properties, and what is actually done in practice. In-depth attention will be given to the MD4 family (which includes MD5 and SHA-1, among others). Time permitting, an overview of the design of selected SHA-3 candidates will also be given.
Web: http://sipb.mit.edu/iap/hash
Contact: David Wilson, dwilson@mit.edu
Sponsor: Student Information Processing Board
Cosponsor: Electrical Engineering and Computer Science
Latest update: 08-Jan-2010


MIT  
Massachusetts Institute of Technology
Home | Overview | Participate | Organize | Offerings | Calendar | Search
Comments and questions to: iap-www@mit.edu Academic Resource Center, Room 7-104, 617-253-1668
Last update: 19 August 2010