* Intro (time:
0:00)
* Hash Functions (time:
1:06, slide(s): 3-6)
* Message Authentication Code (MAC) (time:
1:11, slide(s): 7)
* Digital Signatures (time:
12:50, slide(s): 8-9)
* Other Applications (time:
15:34, slide(s): 10)
* Two Simple Hash Functions (time:
19:35, slide(s): 11)
* Requirements and Security (time:
22:24, slide(s): 13-14)
- Preimage (time:
22:43, slide(s): 13)
- Collision (time:
25:01, slide(s): 13)
* Relationship among Hash Function Properties (time:
29:04, slide(s): 15-16)
* Brute-Force Attacks (time:
32:55, slide(s): 17)
* Crypatanlysis (time:
34:01, slide(s): 17)
* Collision Resistant Attacks (time:
34:20, slide(s): 18-19)
* General Structure of Secure Hash Code (time:
41:28, slide(s): 20)
* Hash Functions Based on Cipher Block Chaining (time:
42:51, slide(s): 21)
* Secure Hash Algorithm (SHA) (time:
45:01, slide(s): 31-30)
* First Collision for Full SHA-1 (time:
57:11)
* Summary (time:
59:09, slide(s): 31)
ANNOTATION BY: an SSP CCE 2021 alumnus who prefered to be anonymous!
--Computer and Network Security