{"guid":"import-ba30979084bcfcc8f9","title":"Hashing Trusted Computing","subtitle":"Der aktuelle Stand","slug":"22C3-495-de-hash_trust_compute","link":"http://events.ccc.de/congress/2005/fahrplan/events/495.en.html","description":"Wir präsentieren ein generisches Angriffs-Framework und zeige exemplarisch neue pratische Angriffe auf digitale Signaturen, die Zertifikats-Infrastruktur und die Bootkontrollsequenzen basierend auf neuen Resultaten zur Hashfunktion SHA-1. Diese Ergebnisse komprimtieren grundlegend die Sicherheit der TCG Architektur.\n","original_language":"eng","persons":["Rüdiger Weis"],"tags":["22c3"," Science"],"view_count":52,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-10-07T22:00:09.929+02:00","length":3523,"duration":3523,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-495-de-hash_trust_compute.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-495-de-hash_trust_compute_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-ba30979084bcfcc8f9-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-ba30979084bcfcc8f9-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-495-de-hash_trust_compute","url":"https://api.media.ccc.de/public/events/import-ba30979084bcfcc8f9","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":79,"event_guid":"import-2654c06bae3e5515d7","weight":1},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":1},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":1},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":2},{"event_id":2219,"event_guid":"2yBK0TAIqddmCWa1MJUNQQ","weight":1},{"event_id":2944,"event_guid":"5fb6f7b5-c237-4b64-b786-85e4c95f13ad","weight":1},{"event_id":3696,"event_guid":"9d36932f-616a-4677-b924-60c1986fbbfc","weight":1},{"event_id":3707,"event_guid":"c19012c9-71de-4272-a6f4-898f5c48b8d9","weight":1},{"event_id":3720,"event_guid":"198bdfe5-24cf-4b2f-9cd5-7522a99b3b4e","weight":1},{"event_id":4883,"event_guid":"ea27b2dc-d558-4fab-8406-a9db30930f8f","weight":1},{"event_id":7885,"event_guid":"3c8f6eff-42ef-5c5d-abfd-00fb58b4d6e8","weight":1}],"recordings":[{"size":124,"length":3523,"mime_type":"audio/ogg","language":"eng","filename":"22C3-495-de-hash_trust_compute.ogg","state":"downloaded","folder":"lectures/audio/ogg","high_quality":true,"width":320,"height":240,"updated_at":"2014-05-10T15:26:36.888+02:00","recording_url":"https://cdn.media.ccc.de/congress/2005/lectures/audio/ogg/22C3-495-de-hash_trust_compute.ogg","url":"https://api.media.ccc.de/public/recordings/1675","event_url":"https://api.media.ccc.de/public/events/import-ba30979084bcfcc8f9","conference_url":"https://api.media.ccc.de/public/conferences/22c3"},{"size":124,"length":3523,"mime_type":"video/mp4","language":"eng","filename":"22C3-495-de-hash_trust_compute.m4v","state":"downloaded","folder":"lectures/video/mp4-avc/320x240","high_quality":true,"width":320,"height":240,"updated_at":"2016-01-27T11:03:18.060+01:00","recording_url":"https://cdn.media.ccc.de/congress/2005/lectures/video/mp4-avc/320x240/22C3-495-de-hash_trust_compute.m4v","url":"https://api.media.ccc.de/public/recordings/1674","event_url":"https://api.media.ccc.de/public/events/import-ba30979084bcfcc8f9","conference_url":"https://api.media.ccc.de/public/conferences/22c3"}]}