Gå frakoblet med Player FM -appen!
15: Cryptography: Hashing, Strong Numbers and Digital Signatures
Manage episode 331642366 series 3010159
In this episode we welcome back Robert Boedigheimer, Microsoft MVP, Pluralsight Author and MDC Speaker for the final part in our series on cryptography. If you haven't listened to part one (Episode 13) and two (Episode 14), we'd suggest listening to those two first.
0:50 The problem of securing private keys
3:15 Introduction to Hashing Functions
4:15 What could go wrong with hashing?
5:10 How to remediate hashing issues?
7:00 Cryptographically strong random numbers for key generation
9:45 Digital signatures
Troy Hunt's aggregation site of compromised usernames and passwords: https://haveibeenpwned.com
Robert's full video on Cryptography 101: https://youtu.be/ahgtAvjWYUI
Minnesota Developers Conference: https://mndevconf.com/
Find Robert at @boedie on Twitter.
The Development Best Practices Podcast is brought to you by ILM Professional Services. Do you want to go to a conference just PACKED with other best practices? Please join me at the Minnesota Developers Conference, where speakers like Robert Boedigheimer, Matt Milner and Kamran Ayub talk about development concepts that can help you today. It's next week - on June 22nd - right here in the Twin Cities, and you can get find out more at mndevconf.com.
Special thanks to Josie Bigler for his help in creating the questions for this episode.
Finally, if you like what you heard in this series, please tell a friend about us. If you have any feedback on this episode or have a topic you'd like us to cover, please email us at podcast@ilmservice.com.
31 episoder
Manage episode 331642366 series 3010159
In this episode we welcome back Robert Boedigheimer, Microsoft MVP, Pluralsight Author and MDC Speaker for the final part in our series on cryptography. If you haven't listened to part one (Episode 13) and two (Episode 14), we'd suggest listening to those two first.
0:50 The problem of securing private keys
3:15 Introduction to Hashing Functions
4:15 What could go wrong with hashing?
5:10 How to remediate hashing issues?
7:00 Cryptographically strong random numbers for key generation
9:45 Digital signatures
Troy Hunt's aggregation site of compromised usernames and passwords: https://haveibeenpwned.com
Robert's full video on Cryptography 101: https://youtu.be/ahgtAvjWYUI
Minnesota Developers Conference: https://mndevconf.com/
Find Robert at @boedie on Twitter.
The Development Best Practices Podcast is brought to you by ILM Professional Services. Do you want to go to a conference just PACKED with other best practices? Please join me at the Minnesota Developers Conference, where speakers like Robert Boedigheimer, Matt Milner and Kamran Ayub talk about development concepts that can help you today. It's next week - on June 22nd - right here in the Twin Cities, and you can get find out more at mndevconf.com.
Special thanks to Josie Bigler for his help in creating the questions for this episode.
Finally, if you like what you heard in this series, please tell a friend about us. If you have any feedback on this episode or have a topic you'd like us to cover, please email us at podcast@ilmservice.com.
31 episoder
Alle episoder
×Velkommen til Player FM!
Player FM scanner netter for høykvalitets podcaster som du kan nyte nå. Det er den beste podcastappen og fungerer på Android, iPhone og internett. Registrer deg for å synkronisere abonnement på flere enheter.