Lead AI Strategy with UCSB's Agentic AI Program — Microsoft Certified
Live Online Classes in Design, Coding & AI — Small Classes, Free Retakes
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the concept of Blind Hashing in this 30-minute conference talk by Jeremy Spilman at BSidesLV 2015. Delve into password security, examining attack vectors and the differences between online and offline attacks. Understand the limitations of iterative hashing and discover the goals of alternative hashing functions. Learn about the Blind Hashing technique, its pseudocode implementation, and analyze potential attacker strategies. Discuss additional challenges in password security and participate in a password game to reinforce concepts. Gain insights into offline attacks and strategies for scaling password protection systems.
Syllabus
Intro
Attack vectors
Online vs offline attacks
The limit of iterative hashing
Goals of a different hashing function
What is Blind Hashing
Pseudocode
Attacker analysis
Additional challenges
Questions
Password game
Offline attacks
How to scale
Taught by
BSidesLV