engl. Beschreibung/ Kurzkommentar |
Cryptographic Hash Functions
Cryptographic hash functions are often considered the "workhorses", the "swiss army knife" and the "duct tape" for the design of complex cryptographic systems and protocols.
This lecture introduces some general design approaches for cryptographic hash functions, such as the Merkle-Damgaard design and the Sponge approach, and general attack technques, suich as cycle finding and distinguished points. This lecture continues by introducing some specific hash functions, such as MD4, MD5, SHA-1, Skein and Keccak, and presents attacks on some of them. Finally, this lecture presents applications of cryptographic hash functions, such as password hashing and blockchains. |
Voraussetzungen |
Zulassungsvoraussetzung: Eine vorausgegangene Einfürung in die Kryptographie, z.B. "Kryptographie und Mediensicherheit", "Modern Cryptography", oder ein entsprechender Kurs einer anderen Hochschule. Studierende, die die Einführung an einer anderen Hochschule besucht haben, müssen diese Voraussetzung bei der Anmeldung zur Prüfung anhand ihres "Transcript of Records" nachweisen.) |