AI Snips
Chapters
Transcript
Episode notes
Winning With Crypto Attack
- Dmitry and JP collaborated on a cryptanalysis challenge against the hash function Ketchak (known as Shessri).
- Their team delivered the best attack and won a crate of Belgian trapez beers as a prize.
Symmetric vs Asymmetric Crypto
- Hash functions originated from symmetric cryptography which is typically faster and involves operations like block ciphers and hash functions.
- Asymmetric cryptography involves public/private key pairs and slower math-heavy operations typically used in public key cryptosystems.
Hash Functions in ZK Proofs
- Hash functions are used inside zero-knowledge proofs within circuits to prove knowledge or membership.
- They are also crucial in recursive proofs to compress computations by generating challenges inside circuits repeatedly.