SHA-3 vs the world

DEF CON 25

Presented by: David Wong
Date: Friday July 28, 2017
Time: 11:00 - 12:00
Location: Florentine Ballroom 4
Track: Crypto and Privacy Village

Since Keccak has been selected as the winner of the SHA-3 competition in 2012, a myriad of different hash functions have been trending. From BLAKE2 to KangarooTwelve we'll cover what hash functions are out there, what is being used, and what you should use. Extending hash functions, we’ll also discover STROBE, asymmetric protocol framework derived from SHA-3.

David Wong

David Wong is aSecurity Consultant at the Cryptography Services practice of NCC Group. Hehas been part of several publicly funded open source audits such as OpenSSLand Let's Encrypt. He has conducted research in many domains in cryptography, publishing whitepapers and sharing results at various conferences including DEF CON and ToorCon as well as giving a recurrent cryptography courseat Black Hat. He has contributed to standards like TLS 1.3 and the Noise Protocol Framework. He has found vulnerabilities in many systems including CVE-2016-3959 in the Go programming language and a bug in SHA-3's derived KangarooTwelve reference implementation. Prior to NCC Group, David graduatedfrom the University of Bordeaux with a Masters in Cryptography, and priorto this from the University of Lyon and McMaster University with a Bachelor in Mathematics. Twitter handle of presenter(s): lyon01_david Website ofpresenter(s) or content: https://www.cryptologie.net


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats