Entire course: ➡️ https://www.youtube.com/playlist?list=PLWjMI9CAmVU4–SmpzgswTvxLkZqC9QWn
⏰ Timestamps for content in this video ⏰
00:00 Hash function security
01:01 Requirements on one-wayness
02:13 Requirements on collision resistance
05:05 Requirements on second pre-image resistance
06:32 Insecurity of MD5 and SHA-1, security of SHA-2 and SHA-3
🔷🔷 About 🔷🔷
This Fundamental Cryptography in Theory and Python lesson presents essential security requirements for hash functions to be considered secure. The lesson then presents, why MD5 and SHA-1 are considered insecure hash functions, and why SHA-2 and SHA-3 are considered secure hash functions.
📝 Resources used and created for code lessons 📝
https://github.com/cgossi/fundamental_cryptography_with_python
🔗 Links included in this video 🔗
https://en.wikipedia.org/wiki/Birthday_attack
https://eprint.iacr.org/2013/170.pdf
https://shattered.io/static/shattered.pdf