Are you an EPFL student looking for a semester project?
Work with us on data science and visualisation projects, and deploy your project as an app on top of Graph Search.
This lecture covers the concept of hash functions, which transform messages into fixed-length outputs without the need for a key. It explains the security properties of cryptographic hash functions, including pre-image resistance, second pre-image resistance, and collision resistance. The instructor also discusses the practical uses of hash functions in digital signatures, password storage, file integrity verification, blockchain technology, and message authentication codes.