COMP6441 : Hashes, Preimage and collision resistance

Поделиться
HTML-код
  • Опубликовано: 5 сен 2024

Комментарии • 35

  • @songofyesterday
    @songofyesterday 6 лет назад +18

    This is the best description of 2nd preimage resistance I've found. Helps a visual learner like me greatly. I found the text in WIlliam Stallings & Lawrie Brown's book not so easy to understand.

  • @tadm123
    @tadm123 5 лет назад +10

    This is the best explanation I'd seen yet. Thanks a lot!

  • @sunnyyang2524
    @sunnyyang2524 5 лет назад +3

    It is so easy to understand hash-function and attacks, thanks for your hard working.Adam

  • @34521ful
    @34521ful 5 лет назад +5

    Best explanation I've seen on youtube. Good stuff mate

  • @samsamhuns928
    @samsamhuns928 5 лет назад +1

    Concise and articulate. The most simple and efficient explanation of second preimage resistance floating around. Keep up the good work.

  • @abdullah557
    @abdullah557 Год назад

    I have my information security exam tomorrow and this is THE BEST video on hashes! thanks Adam you are a legend!

  • @milesisterrible
    @milesisterrible Год назад

    you explained second preimage resistance better than any explanation ive read/seen in 3 minutes, thank you so much!

  • @lennyatomz8389
    @lennyatomz8389 3 года назад

    Well done, Adam! This is, hands down, the most straightforward and understandable explanation of these topics I've ever encountered. Thank you so much for sharing your insights here!! 😁👍

  • @KD-el9uq
    @KD-el9uq Год назад

    Great video

  • @rebeccah2415
    @rebeccah2415 6 лет назад +2

    Thank you Adam, that one was great!

  • @yanahawkins2135
    @yanahawkins2135 3 года назад

    Adam IS the Best! So much clearer than my college professors!

  • @gregcouture8253
    @gregcouture8253 Год назад

    Thanks for the great explanation, Adam! :D

  • @coom57
    @coom57 4 года назад +1

    thank U
    you are the BEST ..

  • @otmanesaiaoud9472
    @otmanesaiaoud9472 11 месяцев назад

    this was very helpful thank you so much

  • @Soner_Dev
    @Soner_Dev 3 года назад

    not all heroes wear capes

  • @neilsagarsahu7306
    @neilsagarsahu7306 Год назад

    I liked it really!

  • @axellundeby6438
    @axellundeby6438 Год назад

    life saver!

  • @paroussis
    @paroussis 3 года назад

    Amazing vid, great job. Thanks

  • @skyboundjg2441
    @skyboundjg2441 3 года назад

    Love this video, thanks Adam! :)

  • @anatolyk9832
    @anatolyk9832 6 лет назад

    hats off, Adam! could not have been better!

  • @Ck2024-z3w
    @Ck2024-z3w 5 лет назад

    Great work. thanks
    @Adam

  • @joelagnel1
    @joelagnel1 6 лет назад +2

    Nice video. Just to add, collision resistance is more useful when using hashing for hash tables, and look up purposes. In this case, lack of col. resistance can result in poor performance.

    • @adamsmallhorn3789
      @adamsmallhorn3789  6 лет назад +2

      Absolutely important for other areas of computing - 100%! But also important in security - if my facebook password - dog - and your password - cat - both hash to the same hash, then probabilistically the set of possible hashes is reduced, and the security is also reduced.

    • @joelagnel1
      @joelagnel1 6 лет назад

      agreed, thanks

  • @syndendesign
    @syndendesign 6 лет назад

    Thank you for the video! Learned alot!

  • @thomasnn
    @thomasnn 6 лет назад

    Very good, thanks!

  • @divyapremchandran1900
    @divyapremchandran1900 3 года назад

    very nice explanation really informative

  • @user-zy3kd4xj7z
    @user-zy3kd4xj7z 6 лет назад

    well explained thx a lot

  • @taner3476
    @taner3476 6 лет назад +3

    What is difference between 2nd preimage attack and CR attack?

    • @joyemoticon
      @joyemoticon 6 лет назад

      In the first case (second preimage resistance), the attacker is handed a fixed m1 to which he has to find a different m2 with equal hash. In particular, he can't choose m1.
      In the second case (collision resistance), the attacker can freely choose both messages m1 and m2, with the only requirement that they are different (and hash to the same value).

    • @adamsmallhorn3789
      @adamsmallhorn3789  6 лет назад +3

      Buttermilk is right - but essentially.... 2nd preimage one of the inputs is fixed, but for collision resistance both of the inputs can be varied.
      2nd preimage is finding a fake version of the newspaper that has the same hash as the legitimate newspaper (harder to do - and more lucrative if you can pull it off). Collision resistance is creating two random newspapers and continuing to randomly generate newspapers until any two that have the same hash (will occur more often following the birthday paradox)

  • @remyaunnikrishnan2037
    @remyaunnikrishnan2037 3 года назад

    Wont the hashes be encrypted to perform collision?

  • @nitram0410
    @nitram0410 7 дней назад

    did not pause the video

  • @SARCASMOOO
    @SARCASMOOO 5 лет назад

    "Fake News" LOLOLOL