[Colloquium] Reminder: [masters-presentation] Akshima/MS Presentation/Dec 6, 2019
Margaret Jaffey
margaret at cs.uchicago.edu
Thu Dec 5 13:18:20 CST 2019
This is a reminder about Akshima’s MS Presentation tomorrow.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Margaret P. Jaffey
Student Affairs Administrator
for the PhD program
Department of Computer Science
The University of Chicago
John Crerar Library, Room 350
5730 S. Ellis Ave.
773-702-6011
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
> On Nov 22, 2019, at 10:55 AM, Margaret Jaffey <margaret at cs.uchicago.edu> wrote:
>
> This is an announcement of Akshima’s MS Presentation.
>
> ------------------------------------------------------------------------------
> Date: Friday, December 6, 2019
>
> Time: 2:00 PM
>
> Place: John Crerar Library 298
>
> M.S. Candidate: Akshima
>
> M.S. Paper Title: Time-Memory Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions
>
> Abstract:
> We study collision-finding against Merkle-Damgård hashing in the random-oracle model by adversaries with an arbitrary S-bit auxiliary advice input about the random oracle and T queries. Recent work showed that such adversaries can find collisions (with respect to a random IV) with advantage Ω(ST^2/2^n), where n is the output length, beating the birthday bound by a factor of S. These attacks were shown to be optimal.
>
> We observe that the collisions produced are very long, on the order T blocks, which would limit their practical relevance. We prove several results related to improving these attacks to find short collisions. We first exhibit a simple attack for finding B-block-long collisions achieving advantage Ω(STB/2^n). We then study if this attack is optimal. We show that the prior technique based on the bit-fixing model (used for the ST^2/2^n bound) provably cannot reach this bound, and towards a general result we prove there are qualitative jumps in the optimal attacks for finding length 1, length 2, and unbounded-length collisions: Namely, the optimal attacks achieve (up to logarithmic factors) order of (S+T)/2^n, ST/2^n and ST^2/2^n advantage. We also give an upper bound on the advantage of a restricted class of short-collision finding attacks via a new analysis on the growth of trees in random functional graphs that may be of independent interest.
>
> Akshima's advisor is Prof. David Cash
>
> Login to the Computer Science Department website for details:
> https://newtraell.cs.uchicago.edu/phd/ms_announcements#akshima <https://newtraell.cs.uchicago.edu/phd/ms_announcements#akshima>
>
> =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
> Margaret P. Jaffey
> Student Affairs Administrator
> for the PhD program
> Department of Computer Science
> The University of Chicago
> John Crerar Library, Room 350
> 5730 S. Ellis Ave.
>
> 773-702-6011
> =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
>
>
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.cs.uchicago.edu/pipermail/colloquium/attachments/20191205/a1944146/attachment.html>
More information about the Colloquium
mailing list