diff --git a/content/cryptography/hashes/slides.md b/content/cryptography/hashes/slides.md index a5b3a22..4d90b7d 100644 --- a/content/cryptography/hashes/slides.md +++ b/content/cryptography/hashes/slides.md @@ -20,12 +20,15 @@ We often want a succinct representation of some data
with the expectation t -1. Accept unbounded size input -1. Map to a bounded output -1. Be fast to compute -1. Be computable strictly one-way
(difficult to find a pre-image for a hash) -1. Resist pre-image attacks
(attacker controls one input) -1. Resist collisions
(attacker controls both inputs) +
+

Accept unbounded size input

+

Map to a bounded output

+

Be fast to compute

+

Be computable strictly one-way
(difficult to find a pre-image for a hash)

+

Resist pre-image attacks
(attacker controls one input)

+

Second pre-image resistance: Given an input and output
(resisting second pre-image attacks).

+

Resist collisions
(attacker controls both inputs)

+
@@ -266,9 +269,11 @@ e.g., a 256 bit hash output yields 2^128 security It should be difficult for someone to partially (for a substring of the hash output) find a collision or "second" pre-image. -- Bitcoin PoW is a partial pre-image attack. -- Prefix/suffix pre-image attack resistance reduces opportunity for UI attacks for address spoofing. -- Prefix collision resistance important to rationalize costs for some cryptographic data structures. +
+

Bitcoin PoW is a partial pre-image attack.

+

Prefix/suffix pre-image attack resistance reduces opportunity for UI attacks for address spoofing.

+

Prefix collision resistance important to rationalize costs for some cryptographic data structures.

+
---