Key derivation functions | Cryptography standards

PBKDF2

In cryptography, PBKDF1 and PBKDF2 (Password-Based Key Derivation Function 1 and 2) are key derivation functions with a sliding computational cost, used to reduce vulnerabilities of brute-force attacks. PBKDF2 is part of RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, specifically PKCS #5 v2.0, also published as Internet Engineering Task Force's RFC 2898. It supersedes PBKDF1, which could only produce derived keys up to 160 bits long. RFC 8018 (PKCS #5 v2.1), published in 2017, recommends PBKDF2 for password hashing. (Wikipedia).

PBKDF2
Video thumbnail

Game Development in Python 3 With PyGame - 14 - Button Function

See http://pythonprogramming.net for sample code PyGame with Python 3 Playlist: http://www.youtube.com/playlist?list=PLQVvvaa0QuDdLkP8MrOXLe_rKuf6r80KO In this PyGame with Python 3 programming tutorial, we cover how we can turn the button creation in PyGame code into a function that we c

From playlist PyGame with Python 3 Game Development

Video thumbnail

OpenGL with PyOpenGL Python and PyGame p.3 - Movement and Navigation

In this tutorial, we learn some more of the basics of OpenGL using PyOpenGL, which is a Python module for working with OpenGL, along with using PyGame, which is a popular gaming module for Python. PyOpenGL works with many other Python modules as well. In this example, we learn more about t

From playlist PyGame with Python 3 Game Development

Video thumbnail

Game Development in Python 3 With PyGame - 12 - Button interaction

See http://pythonprogramming.net for sample code PyGame with Python 3 Playlist: http://www.youtube.com/playlist?list=PLQVvvaa0QuDdLkP8MrOXLe_rKuf6r80KO In this PyGame with Python 3 programming tutorial, we cover the creation of a hover effect for our buttons. The idea of making buttons c

From playlist PyGame with Python 3 Game Development

Video thumbnail

Game Development in Python 3 With PyGame - 16 - Convert to executable

See http://pythonprogramming.net for sample code PyGame with Python 3 Playlist: http://www.youtube.com/playlist?list=PLQVvvaa0QuDdLkP8MrOXLe_rKuf6r80KO In this PyGame with Python 3 programming tutorial, we cover how we can convert our PyGame into an executable, or an installer, which we

From playlist PyGame with Python 3 Game Development

Video thumbnail

Game Development in Python 3 With PyGame - 11 - Buttons p. 1

See http://pythonprogramming.net for sample code PyGame with Python 3 Playlist: http://www.youtube.com/playlist?list=PLQVvvaa0QuDdLkP8MrOXLe_rKuf6r80KO In this PyGame with Python 3 tutorial, we cover the idea of button creation with PyGame. At the time of me making this video, there is n

From playlist PyGame with Python 3 Game Development

Video thumbnail

Bitcoin Q&A: Optional Passphrases (Advanced Security Feature) and Seed Storage

Do optional passphrases protect against leaks or compromises of mnemonic seed words? Why are brain wallets usually insecure? Why should you not "roll your own crypto" and promote creative schemes that deviate from the standards (like BIP39), without at least getting peer review and testing

From playlist English Subtitles - aantonop Videos with subtitles in English

Video thumbnail

0109 [ C++/React ] player registration

This is #109 in my series of live (Twitch) coding streams. This stream I implemented the PBKDF2 (Password-Based Key Derivation Function 2) specified in RFC 8018, for use in storing hashed player passwords in the game state. I also added a command and state object for storing player inf

From playlist Excalibur

Video thumbnail

UBUNTU Using GRUB2 passwords

More videos like this online at http://www.theurbanpenguin.com Password protecting the boot menu As with the legacy GRUB it is possible to edit menu entries during the boot process. This may not always desirable so this, as before can be secured using passwords but additionally usernames a

From playlist Learning Ubuntu Server

Video thumbnail

GoGaRuCo 2012 - Modern Cryptography

Modern Cryptography by: John Downey Once the realm of shadowy government organizations, cryptography now permeates computing. Unfortunately, it is difficult to get correct and most developers know just enough to be harmful for their projects. Together, we’ll go through the basics of moder

From playlist gogaruco 2012

Video thumbnail

DjangoCon US 2017 - hunter2: A Symphony of Password Horror by Lilly Ryan

DjangoCon US 2017 - hunter2: A Symphony of Password Horror by Lilly Ryan The year is 2017. We have hoverboards, jetpacks, solar-powered cars, and also so many awful passwords that it’s become trivial for pretty much anyone to have their accounts compromised. We’ve got passwords for our p

From playlist DjangoCon US 2017

Video thumbnail

RedDotRuby 2014 - 80,000 Plaintext Passwords: An Open Source Love Story in 3 Acts by T.j. Schuck

fluffmuffin, peppercorn, gilligan — those are just a few of our users' plain text passwords. I have 80,000 more, and it only took me 87 seconds to gather them from our customer database in a white-hat attack. In Act I, we'll cover the history of secure password storage, examine the hack,

From playlist RedDotRuby 2014

Video thumbnail

OpenGL with PyOpenGL Python and PyGame p.2 - Coloring Surfaces

In this tutorial, we learn some more of the basics of OpenGL using PyOpenGL, which is a Python module for working with OpenGL, along with using PyGame, which is a popular gaming module for Python. PyOpenGL works with many other Python modules as well. In this example, we work on how to pro

From playlist PyGame with Python 3 Game Development

Video thumbnail

DEFCON 20: Cryptohaze Cloud Cracking

Speaker: BITWEASIL LEAD DEVELOPER, CRYPTOHAZE TOOLS Bitweasil goes through the latest developments in the Cryptohaze GPU based password cracking suite. WebTables is a new rainbow table technology that eliminates the need to download rainbow tables before using them, and the new Cryptohaze

From playlist DEFCON 20

Video thumbnail

Game Development in Python 3 With PyGame - 18 - Game Over

See http://pythonprogramming.net for sample code PyGame with Python 3 Playlist: http://www.youtube.com/playlist?list=PLQVvvaa0QuDdLkP8MrOXLe_rKuf6r80KO In this PyGame with Python 3 programming tutorial, we cover how to add a better "game over" sequence for our game. The previous game ove

From playlist PyGame with Python 3 Game Development

Video thumbnail

Tim Taubert: Keeping secrets with JavaScript | JSConf EU 2014

With the web slowly maturing as a platform the demand for cryptography in the browser has risen, especially in a post-Snowden era. Many of us have heard about the upcoming Web Cryptography API but at the time of writing there seem to be no good introductions available. We will take a look

From playlist JSConf EU 2014

Video thumbnail

Game Development in Python 3 With PyGame - 6 - Drawing Objects / moving objects

In this Python game development tutorial, we cover how to draw objects on the screen, as well as move them to give the appearance that our car is driving. See http://pythonprogramming.net for sample code PyGame with Python 3 Playlist: http://www.youtube.com/playlist?list=PLQVvvaa0QuDdLk

From playlist PyGame with Python 3 Game Development

Video thumbnail

Game Development in Python 3 With PyGame - 8 - Score, challenge, conclusion

Here, we wrap up our Python 3 with PyGame game development tutorial. We add a scoring function, as well as increasing the game's difficulty using a few different options to make the game harder. I hope you all enjoy, and I encourage you to keep building on top of it! See http://pythonpro

From playlist PyGame with Python 3 Game Development

Video thumbnail

DjangoCon US 2015 - Making Django Really, Really, Ridiculously Secure (CW) by Kelsey Gilmore-Innis

Callisto (http://projectcallisto.org/) is an online reporting system designed to provide a more empowering, transparent, and confidential reporting experience for college sexual assault survivors. It's absolutely essential that we keep our user's data secure. So essential, in fact, that we

From playlist DjangoCon 2015

Video thumbnail

RailsConf 2017: The Art & Craft of Secrets: Using the Cryptographic Toolbox by Michael Swieton

RailsConf 2017: The Art & Craft of Secrets: Using the Cryptographic Toolbox by Michael Swieton Picking an encryption algorithm is like choosing a lock for your door. Some are better than others - but there's more to keeping burglars out of your house (or web site) than just the door lock

From playlist RailsConf 2017

Related pages

Key derivation function | Key stretching | Lyra2 | Password Hashing Competition | Argon2 | Scrypt | Brute-force attack | Bcrypt | Password cracking | Salt (cryptography) | Balloon hashing | Passphrase | List of PBKDF2 implementations | Key (cryptography) | Cryptography