Some people are born with the capacity of designing good things but most of others they actually learn from breaking so you're kind of supposed to break things several times before you learn how to design a good one. I would like to add to the previous comment by GP about also too much crypto indeed some cryptographers are scary of not only of modern hash functions but also of older hash function that don't have a security proof. But here we would add that this hash functions I usually should not be considered just as black box so they when we mentioned some number of rounds this rounds means that the hash function is built as a sequence of more or less identical components and the history of design and analysis it's
In this week’s episode, Anna and Kobi Gurkan speak with Dmitry Khovratovich, researcher at the Ethereum Foundation, Dusk Network, and ABDK Consulting and JP Aumasson CSO at Taurus. This episode compares symmetric and asymmetric cryptography as well as a deep dive into hash functions. They explore what hash functions are used for, the process of developing and improving hash functions, and what it means for a hash function to be zk friendly.
Here are some additional links for this episode:
- Dmitry Khovratovich Twitter
- Ethereum Foundation
- Dusk Network
- ABDK Consulting
- JP Aumasson Twitter
- JP Aumasson Website
- Taurus Twitter
- Taurus Website
- ZK8: New Directions in ZK hashing - Dmitry Khovratovich - Ethereum Foundation
- ZK8: On ZK hashes - JP Aumasson - Taurus
- ZK7: Security of ZKP projects: same but different - JP Aumasson - Taurus
- Serious Cryptography - JP Aumasson, 2017
- Too Much Crypto - JP Aumasson, 2019
- Crypto Dictionary - JP Aumasson
- Scalable, transparent, and post-quantum secure computational integrity - Ben-Sasson, Bentov, Horesh, Riabzev, 2018, page 71
- NIST National Institute of Standards and Technology
- BLAKE2
- Poseidon Network
- SHA-3
- Reinforced Concrete - Maharramov, 2021
- Nova - Recursive Zero-Knowledge Arguments from Folding Schemes - Kothapalli, Setty, Tzialla, 2021
- ZK8: Fantastic Beasts: unfolding ZK hardware - Omer Shlomovits - Ingonyama
Find the Aleo repo here github.com/aleohq.
Today's episode is sponsored by Anoma.
Anoma is a set of protocols that enable self sovereign coordination.
Anoma's first fractal instance Namada is planned for later in 2022, and it focuses on enabling shielded transfers for any assets, with a few second transaction latency and near zero fees.
Visit anoma.net for more information.
If you like what we do: