Earn Your Business Degree, Tuition-Free, 100% Online!
Power BI Fundamentals - Create visualizations and dashboards from scratch
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the critical aspects of password security in this 25-minute conference talk from BSidesLV 2015. Delve into the world of hash functions, work attacks, and data dependency as Joseph Birr-Pixton examines the performance implications of PBKDF2 (Password-Based Key Derivation Function 2). Learn about the Krypton algorithm and its practical differences compared to traditional methods. Analyze graphical representations of PBKDF2 performance and gain valuable insights into enhancing password protection strategies. Conclude with a Q&A session to address specific concerns and deepen your understanding of this crucial cybersecurity topic.
Syllabus
Introduction
Hash Functions
Attack of Work
Data Dependency
Krypton
Winner
Practical difference
PBKDF2 Ads
Graph
Conclusion
QA
Taught by
BSidesLV