Enhancing Password-Based Key Derivation Techniques
Offered By: YouTube
Course Description
Overview
Explore advanced techniques for enhancing password-based key derivation in this 38-minute conference talk from Passwordscon 2014. Delve into topics such as Sequel Cipher, adaptive KDF goals and examples, and the challenges associated with static keys. Learn about the pros and cons of various approaches, including system load considerations and user experience impacts. Examine current KDF implementations and hardware token solutions like Yubikey, DotPlug, and Bull. Gain insights into simple implementation strategies and general results, equipping yourself with valuable knowledge to improve password security in your systems.
Syllabus
Introduction
Platforms
Sequel Cipher
Sequel Cipher evolution
Problems with static keys
Adaptive KDF goals
Adaptive KDF examples
Pros and cons
System load
User experience
Current KDF
Hardware Tokens
Yubikey
DotPlug
Bull
Simple implementation
General results
More information
Related Courses
Digitale Identitäten - Wer bin ich im Netz?openHPI Introduction to Cybersecurity for Teachers
Raspberry Pi Foundation via FutureLearn Security Awareness Training
(ISC)² via Coursera Learn Social Engineering From Scratch 2024
Udemy Certified Ethical Hacker دورة إعداد الـ
Udemy