Hashing Passwords Safely using a Password Based Key Derivation Function (PBKDF2)

Поделиться
HTML-код
  • Опубликовано: 13 окт 2024

Комментарии • 11

  • @Skillamu
    @Skillamu Год назад

    This gave me a much better understanding of PBKDF2, thank you. Great video!

  • @alexv2553
    @alexv2553 4 года назад +2

    This was so opaque, and after watching this it's so simple. Thanks!

  • @rorycawley
    @rorycawley 7 месяцев назад

    You're a great teacher

  • @juanjocg1870
    @juanjocg1870 3 года назад

    Thanks!, I'm coding an encrypted notepad on java and this is so helpful

  • @nikolay6174
    @nikolay6174 3 года назад

    hello. I didn't understand one point. Why do a lot of iterations if at the end I get a Hash with collisions. Or am I missing something?

  • @realmanproject7529
    @realmanproject7529 2 года назад

    So much love British accent

  • @mikeverlinde7116
    @mikeverlinde7116 2 года назад

    Thank you ser

  • @supbra1
    @supbra1 3 года назад

    Intersting, thanks!

  • @coding4well
    @coding4well 3 года назад

    wait does pbkdf2 is weak? that what i read from some resources

  • @JarppaGuru
    @JarppaGuru 2 года назад

    3:41 before that there is new bcoz more power calculate,but mac still cost same full price upgrade even its faster lol lol

  • @JarppaGuru
    @JarppaGuru 2 года назад

    2:50 you think you safe when you see red not found. you just leaked your hash LOL even they cant do any with it they can save it. just like amipwned sites give password BOOM if it not leaked then its now LOL you give it yourself lol lol