Lépjen offline állapotba az Player FM alkalmazással!
15: Cryptography: Hashing, Strong Numbers and Digital Signatures
Manage episode 331642366 series 3010159
In this episode we welcome back Robert Boedigheimer, Microsoft MVP, Pluralsight Author and MDC Speaker for the final part in our series on cryptography. If you haven't listened to part one (Episode 13) and two (Episode 14), we'd suggest listening to those two first.
0:50 The problem of securing private keys
3:15 Introduction to Hashing Functions
4:15 What could go wrong with hashing?
5:10 How to remediate hashing issues?
7:00 Cryptographically strong random numbers for key generation
9:45 Digital signatures
Troy Hunt's aggregation site of compromised usernames and passwords: https://haveibeenpwned.com
Robert's full video on Cryptography 101: https://youtu.be/ahgtAvjWYUI
Minnesota Developers Conference: https://mndevconf.com/
Find Robert at @boedie on Twitter.
The Development Best Practices Podcast is brought to you by ILM Professional Services. Do you want to go to a conference just PACKED with other best practices? Please join me at the Minnesota Developers Conference, where speakers like Robert Boedigheimer, Matt Milner and Kamran Ayub talk about development concepts that can help you today. It's next week - on June 22nd - right here in the Twin Cities, and you can get find out more at mndevconf.com.
Special thanks to Josie Bigler for his help in creating the questions for this episode.
Finally, if you like what you heard in this series, please tell a friend about us. If you have any feedback on this episode or have a topic you'd like us to cover, please email us at podcast@ilmservice.com.
31 epizódok
Manage episode 331642366 series 3010159
In this episode we welcome back Robert Boedigheimer, Microsoft MVP, Pluralsight Author and MDC Speaker for the final part in our series on cryptography. If you haven't listened to part one (Episode 13) and two (Episode 14), we'd suggest listening to those two first.
0:50 The problem of securing private keys
3:15 Introduction to Hashing Functions
4:15 What could go wrong with hashing?
5:10 How to remediate hashing issues?
7:00 Cryptographically strong random numbers for key generation
9:45 Digital signatures
Troy Hunt's aggregation site of compromised usernames and passwords: https://haveibeenpwned.com
Robert's full video on Cryptography 101: https://youtu.be/ahgtAvjWYUI
Minnesota Developers Conference: https://mndevconf.com/
Find Robert at @boedie on Twitter.
The Development Best Practices Podcast is brought to you by ILM Professional Services. Do you want to go to a conference just PACKED with other best practices? Please join me at the Minnesota Developers Conference, where speakers like Robert Boedigheimer, Matt Milner and Kamran Ayub talk about development concepts that can help you today. It's next week - on June 22nd - right here in the Twin Cities, and you can get find out more at mndevconf.com.
Special thanks to Josie Bigler for his help in creating the questions for this episode.
Finally, if you like what you heard in this series, please tell a friend about us. If you have any feedback on this episode or have a topic you'd like us to cover, please email us at podcast@ilmservice.com.
31 epizódok
Minden epizód
×Üdvözlünk a Player FM-nél!
A Player FM lejátszó az internetet böngészi a kiváló minőségű podcastok után, hogy ön élvezhesse azokat. Ez a legjobb podcast-alkalmazás, Androidon, iPhone-on és a weben is működik. Jelentkezzen be az feliratkozások szinkronizálásához az eszközök között.