Главная
Study mode:
on
1
Introduction
2
Hash Functions
3
Attack of Work
4
Data Dependency
5
Krypton
6
Winner
7
Practical difference
8
PBKDF2 Ads
9
Graph
10
Conclusion
11
QA
Description:
Explore the critical aspects of password security in this 25-minute conference talk from BSidesLV 2015. Delve into the world of hash functions, work attacks, and data dependency as Joseph Birr-Pixton examines the performance implications of PBKDF2 (Password-Based Key Derivation Function 2). Learn about the Krypton algorithm and its practical differences compared to traditional methods. Analyze graphical representations of PBKDF2 performance and gain valuable insights into enhancing password protection strategies. Conclude with a Q&A session to address specific concerns and deepen your understanding of this crucial cybersecurity topic.

PBKDF2 - Performance Matters

BSidesLV
Add to list