Home / Series / Chaos Communication Congress / Aired Order / Season 36 / Episode 104

Provable Insecurity

(where artifacts come from, and how constructive math may help) Cryptographic hash functions are everywhere, yet modeling the characteristics of their real-world occurrences is surprisingly complicated when trying to prove security. We argue how seemingly convenient features of doing classical math may make it actually harder to model them correctly.

English
  • Originally Aired December 29, 2019
  • Runtime 60 minutes
  • Production Code 10928
  • Created December 29, 2019 by
    Administrator admin
  • Modified December 29, 2019 by
    Administrator admin