YoVDO

What We've Learned with Two-Secret Key Derivation

Offered By: BSidesLV via YouTube

Tags

Security BSides Courses Cybersecurity Courses Team Leadership Courses Password Management Courses Key Derivation Courses

Course Description

Overview

Explore the intricacies of two-secret key derivation in this 36-minute conference talk from BSidesLV 2016. Delve into the lessons learned by Jeffrey Goldberg and Julie Haugh as they discuss password security and key management. Learn about the concept of count keys, server storage techniques, and the introduction of new secrets. Understand the role of team leaders and the process of adding new members like Morgan to a secure system. Discover the importance of account keys and recovery methods. Engage with the speakers through a Q&A session, addressing audience inquiries and potential drawbacks of the system. Gain valuable insights into advanced cryptographic techniques and their practical applications in password management and team security.

Syllabus

Introduction
Twosecret key derivation
Count key
Store on server
New secret
Team leader
Morgan
OnePassword
CountKey
Adding Morgan
Account Key
Recovery
Questions
Audience Questions
Negatives


Taught by

BSidesLV

Related Courses

Raccoon Attack - Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)
TheIACR via YouTube
Applied Cryptography and Trust - Hashing
Bill Buchanan OBE via YouTube
Golang and Cryptography - Part 1
Bill Buchanan OBE via YouTube
I Am AD FS and So Can You - Attacking Active Directory Federated Services
WEareTROOPERS via YouTube
Secure Channels - Building Real World Crypto Systems
BruCON Security Conference via YouTube