Enhancing Password-Based Key Derivation Techniques
Offered By: YouTube
Course Description
Overview
Explore advanced techniques for enhancing password-based key derivation in this 38-minute conference talk from Passwordscon 2014. Delve into topics such as Sequel Cipher, adaptive KDF goals and examples, and the challenges associated with static keys. Learn about the pros and cons of various approaches, including system load considerations and user experience impacts. Examine current KDF implementations and hardware token solutions like Yubikey, DotPlug, and Bull. Gain insights into simple implementation strategies and general results, equipping yourself with valuable knowledge to improve password security in your systems.
Syllabus
Introduction
Platforms
Sequel Cipher
Sequel Cipher evolution
Problems with static keys
Adaptive KDF goals
Adaptive KDF examples
Pros and cons
System load
User experience
Current KDF
Hardware Tokens
Yubikey
DotPlug
Bull
Simple implementation
General results
More information
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera