Zero Knowledge

What’s the Deal with Hash Functions?

Oct 19, 2022
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ANECDOTE

Winning With Crypto Attack

  • Dmitry and JP collaborated on a cryptanalysis challenge against the hash function Ketchak (known as Shessri).
  • Their team delivered the best attack and won a crate of Belgian trapez beers as a prize.
INSIGHT

Symmetric vs Asymmetric Crypto

  • Hash functions originated from symmetric cryptography which is typically faster and involves operations like block ciphers and hash functions.
  • Asymmetric cryptography involves public/private key pairs and slower math-heavy operations typically used in public key cryptosystems.
INSIGHT

Hash Functions in ZK Proofs

  • Hash functions are used inside zero-knowledge proofs within circuits to prove knowledge or membership.
  • They are also crucial in recursive proofs to compress computations by generating challenges inside circuits repeatedly.
Get the Snipd Podcast app to discover more snips from this episode
Get the app