Главная
Study mode:
on
1
Intro
2
Confidentiality
3
Asymmetric Encryption
4
Asymmetric Algorithms
5
One-Way Functions
6
Crypto Hash Algorithms
7
SSH
8
Password Authenticity
9
Password Hash Algorithms
10
PBKDF2
11
scrypt
12
bcrypt
13
Integrity
14
Breaking Passwords
15
Defending Passwords
16
Salts
Description:
Explore data security and cryptographic tools in this 36-minute talk by Peter Faiman, White Hat VP. Learn about pseudo-random functions (PRFs), cryptographic hashes, message authentication codes (MACs), and encryption algorithms. Dive into topics such as confidentiality, asymmetric encryption, one-way functions, SSH, password authenticity, and integrity. Discover various password hash algorithms including PBKDF2, scrypt, and bcrypt. Understand techniques for breaking passwords and strategies for defending them, including the use of salts. Gain valuable insights into securing data and implementing robust cryptographic measures.

Secure Storage - Peter Faiman

White Hat Cal Poly
Add to list