| |  | | What makes a cryptographic protocol strong?
1. Passphrase, password, and key
2. Passphrase, password, and key, part 2
3. Passphrase, password, and key, part 3
4. Security versus obscurity
5. Security versus obscurity, part 2
6. Key lengths and brute-force attacks
7. Key lengths and brute-force attacks, part 2
8. Key lengths and brute-force attacks, part 3
9. Key lengths and brute-force attacks, part 4
10. Dictionary attacks on passwords
|