YoVDO

Protecting Passwords with Oblivious Cryptography

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Cryptography Courses Pseudorandom Functions Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore password protection techniques using oblivious cryptography in this conference talk from CypherCon 2.0. Delve into the vulnerabilities of ubiquitous passwords and learn about Pseudorandom Functions (PRF) and their role in enhancing security. Examine password database compromises and Facebook's Password Onion approach. Discover the concept of Remote HMAC for distributing trust and the innovative Pythia PRF approach. Understand the PRF query process for new users and strategies for compromise recovery. Analyze why existing crypto primitives fall short and explore the construction and advantages of Partially Oblivious PRF. Learn about fast, scalable PRF services and their applications beyond web servers. Conclude with an overview of the open-source Pythia implementation, equipping you with cutting-edge knowledge to bolster password protection in various digital environments.

Syllabus

Intro
Summary Passwords: Ubiquitous, but vulnerable to offline attack
Pseudorandom Function (PRF)
Password Database Compromises
Facebook's Password Onion
Remote HMAC Distributes Trust
Our Approach: Pythia PRF
PRF Query – New User
Compromise Recovery
Existing Crypto Primitives are Insufficient
Partially Obl. PRF Construction
Advantages of Partially Obl. PRF
Fast, Scalable PRF Service
Beyond Web Servers
Conclusion
Pythia Open Source Implementation


Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera