Overview
Syllabus
Introduction
Who am I
The Ashley Madison leak
Password management policies
Definitions
How hashes work
Cryptographic hashes
Examples of hash functions
Hash is oneway functions
Password space
Collisions
Google announcement
How servers store passwords
Logins work
We can pretend
Bruteforcing
Permutation
Parallel lines
Rainbow tables
Reduction function
Rainbow table
Rainbow table example
Rainbow table downsides
Worst case
Sequence of reduction
New idea
What hash function does
What if we track regions
A few more definitions
Some more examples
What does this mean
Storing the digest
Groovy technology
Spacetime tradeoffs
Data structure
Hash functions
Bloom filters
Bloom reverse system
Brute force
Example