YoVDO

Blind Hashing

Offered By: BSidesLV via YouTube

Tags

Security BSides Courses Cybersecurity Courses Password Security Courses Hashing Algorithms Courses

Course Description

Overview

Explore the concept of Blind Hashing in this 30-minute conference talk by Jeremy Spilman at BSidesLV 2015. Delve into password security, examining attack vectors and the differences between online and offline attacks. Understand the limitations of iterative hashing and discover the goals of alternative hashing functions. Learn about the Blind Hashing technique, its pseudocode implementation, and analyze potential attacker strategies. Discuss additional challenges in password security and participate in a password game to reinforce concepts. Gain insights into offline attacks and strategies for scaling password protection systems.

Syllabus

Intro
Attack vectors
Online vs offline attacks
The limit of iterative hashing
Goals of a different hashing function
What is Blind Hashing
Pseudocode
Attacker analysis
Additional challenges
Questions
Password game
Offline attacks
How to scale


Taught by

BSidesLV

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network