Главная
Study mode:
on
1
Introduction
2
Platforms
3
Sequel Cipher
4
Sequel Cipher evolution
5
Problems with static keys
6
Adaptive KDF goals
7
Adaptive KDF examples
8
Pros and cons
9
System load
10
User experience
11
Current KDF
12
Hardware Tokens
13
Yubikey
14
DotPlug
15
Bull
16
Simple implementation
17
General results
18
More information
Description:
Explore advanced techniques for enhancing password-based key derivation in this 38-minute conference talk from Passwordscon 2014. Delve into topics such as Sequel Cipher, adaptive KDF goals and examples, and the challenges associated with static keys. Learn about the pros and cons of various approaches, including system load considerations and user experience impacts. Examine current KDF implementations and hardware token solutions like Yubikey, DotPlug, and Bull. Gain insights into simple implementation strategies and general results, equipping yourself with valuable knowledge to improve password security in your systems.

Enhancing Password-Based Key Derivation Techniques

Add to list