Главная
Study mode:
on
1
Slideout Crypt
2
Dice
3
Password Advice
4
Email for Dummies
5
Todays Problem
6
Enterprise Problem
7
Database Breaches
8
Two Types of Companies
9
Existing Methods
10
Arms Race
11
Are we there yet
12
Encryption
13
What is Rock Salt
14
What is VLK
15
How Rock Salt Works
16
Block Diagram of Rock Salt
17
Two Person Integrity
18
Data Guard
19
Password Verification
20
Short Passwords
21
Potential Attacks
22
Advantages
23
Limitations
24
Business Problems
Description:
Explore a comprehensive method for secure password storage and validation in this 43-minute conference talk from BSidesLV 2016. Delve into the concept of Rock Salt, a technique designed to address enterprise-level password security challenges and mitigate the risks associated with database breaches. Learn about the implementation of Rock Salt, including its use of encryption, Very Large Keys (VLK), and two-person integrity systems. Examine the block diagram of Rock Salt, understand its advantages and limitations, and discover how it tackles various potential attacks. Additionally, gain insights into handling short passwords, business-related issues, and compare Rock Salt to existing password security methods. This presentation by Arnold Reinhold offers valuable knowledge for cybersecurity professionals and organizations seeking to enhance their password protection strategies.

Rock Salt - A Method for Securely Storing and Utilizing Password Validation Data

BSidesLV
Add to list