YoVDO

New Results in Password Hash Reversal

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Cryptography Courses Bloom Filters Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore cutting-edge techniques in password hash reversal in this 59-minute conference talk from Bloomcon 2017. Delve into the intricacies of cryptographic hashes, password management policies, and the implications of the Ashley Madison leak. Learn about brute-forcing methods, rainbow tables, and their limitations. Discover innovative approaches like region tracking and Bloom filters for more efficient password cracking. Gain insights into space-time tradeoffs, data structures, and the latest developments in hash function analysis. Understand the potential impact of these advancements on cybersecurity and password protection strategies.

Syllabus

Introduction
Who am I
The Ashley Madison leak
Password management policies
Definitions
How hashes work
Cryptographic hashes
Examples of hash functions
Hash is oneway functions
Password space
Collisions
Google announcement
How servers store passwords
Logins work
We can pretend
Bruteforcing
Permutation
Parallel lines
Rainbow tables
Reduction function
Rainbow table
Rainbow table example
Rainbow table downsides
Worst case
Sequence of reduction
New idea
What hash function does
What if we track regions
A few more definitions
Some more examples
What does this mean
Storing the digest
Groovy technology
Spacetime tradeoffs
Data structure
Hash functions
Bloom filters
Bloom reverse system
Brute force
Example


Related Courses

Graph Search, Shortest Paths, and Data Structures
Stanford University via Coursera
Algorithms for Searching, Sorting, and Indexing
University of Colorado Boulder via Coursera
Advanced SQL for Data Scientists
LinkedIn Learning
Cassandra Data Modeling Essential Training
LinkedIn Learning
Algorithms for Big Data
Indian Institute of Technology Madras via Swayam