Lecture

Hash Collisions: Exploitation Techniques and Strategies

Description

This lecture delves into the exploitation of hash collisions, covering various attacks on hash functions like SHA-1 and MD5, the consequences of collisions, and strategies for exploiting them in file formats such as JPEG and PDF. The presentation explores the concepts of identical prefix collision (IPC) and chosen prefix collision (CPC), along with techniques like If-then-else and format concatenation. It also discusses the development of hashquines and their impact on file formats. The lecture concludes with insights into the future work on other file formats and hash functions.

About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.