Date: 14 Feb 1997 12:30:22 -0600 From: stephen farrell <sfarrell@healthquiz.com> To: Brandon Gillespie <brandon@cold.org> Cc: Warner Losh <imp@village.org>, security@freebsd.org Subject: Re: blowfish passwords in FreeBSD Message-ID: <87sp2zkzpd.fsf@phaedrus.uchicago.edu> In-Reply-To: Brandon Gillespie's message of Fri, 14 Feb 1997 09:21:17 -0700 (MST) References: <Pine.NEB.3.95.970214092046.3845B-100000@cold.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Brandon Gillespie <brandon@cold.org> writes: > > On Thu, 13 Feb 1997, Warner Losh wrote: > > OpenBSD just committed a new encryption method using blowfish. This > > has a much larger salt space as well as a much harder to break > > encryption scheme. Preliminary indications are that it looks really > > good. They implemented this much like md5, but with its own code. > > > > I think we should bring this into FreeBSD. What do others think? > > How does it compare to SHA? We've had SHA encryption sitting in PR for a > few months now, it uses the $2$ 'id'. here's a pretty cool URL for htis stuff: <URL:http://www.cs.hut.fi/crypto/algorithms.html>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?87sp2zkzpd.fsf>