YoVDO

Blind Hashing

Offered By: BSidesLV via YouTube

Tags

Security BSides Courses Cybersecurity Courses Password Security Courses Hashing Algorithms Courses

Course Description

Overview

Explore the concept of Blind Hashing in this 30-minute conference talk by Jeremy Spilman at BSidesLV 2015. Delve into password security, examining attack vectors and the differences between online and offline attacks. Understand the limitations of iterative hashing and discover the goals of alternative hashing functions. Learn about the Blind Hashing technique, its pseudocode implementation, and analyze potential attacker strategies. Discuss additional challenges in password security and participate in a password game to reinforce concepts. Gain insights into offline attacks and strategies for scaling password protection systems.

Syllabus

Intro
Attack vectors
Online vs offline attacks
The limit of iterative hashing
Goals of a different hashing function
What is Blind Hashing
Pseudocode
Attacker analysis
Additional challenges
Questions
Password game
Offline attacks
How to scale


Taught by

BSidesLV

Related Courses

Cryptography and Hashing Overview
University of California, Irvine via Coursera
Learn Blockchain By Building Your Own In JavaScript
Udemy
Practical Encryption and Cryptography Using Python
Pluralsight
Introducción a Blockchain, Criptomonedas y Smart Contracts
Udemy
Cryptography: Learn Public Key Infrastructure from Scratch
Udemy