Lecture

Hash Collisions: Exploitation Techniques and Strategies

Description

This lecture delves into the exploitation of hash collisions, covering various attacks on hash functions like SHA-1 and MD5, the consequences of collisions, and strategies for exploiting them in file formats such as JPEG and PDF. The presentation explores the concepts of identical prefix collision (IPC) and chosen prefix collision (CPC), along with techniques like If-then-else and format concatenation. It also discusses the development of hashquines and their impact on file formats. The lecture concludes with insights into the future work on other file formats and hash functions.

About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.