Completed
Who am I
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
New Results in Password Hash Reversal
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Who am I
- 3 The Ashley Madison leak
- 4 Password management policies
- 5 Definitions
- 6 How hashes work
- 7 Cryptographic hashes
- 8 Examples of hash functions
- 9 Hash is oneway functions
- 10 Password space
- 11 Collisions
- 12 Google announcement
- 13 How servers store passwords
- 14 Logins work
- 15 We can pretend
- 16 Bruteforcing
- 17 Permutation
- 18 Parallel lines
- 19 Rainbow tables
- 20 Reduction function
- 21 Rainbow table
- 22 Rainbow table example
- 23 Rainbow table downsides
- 24 Worst case
- 25 Sequence of reduction
- 26 New idea
- 27 What hash function does
- 28 What if we track regions
- 29 A few more definitions
- 30 Some more examples
- 31 What does this mean
- 32 Storing the digest
- 33 Groovy technology
- 34 Spacetime tradeoffs
- 35 Data structure
- 36 Hash functions
- 37 Bloom filters
- 38 Bloom reverse system
- 39 Brute force
- 40 Example