Explore the critical aspects of password security in this 25-minute conference talk from BSidesLV 2015. Delve into the world of hash functions, work attacks, and data dependency as Joseph Birr-Pixton examines the performance implications of PBKDF2 (Password-Based Key Derivation Function 2). Learn about the Krypton algorithm and its practical differences compared to traditional methods. Analyze graphical representations of PBKDF2 performance and gain valuable insights into enhancing password protection strategies. Conclude with a Q&A session to address specific concerns and deepen your understanding of this crucial cybersecurity topic.
Overview
Syllabus
Introduction
Hash Functions
Attack of Work
Data Dependency
Krypton
Winner
Practical difference
PBKDF2 Ads
Graph
Conclusion
QA
Taught by
BSidesLV