Skip site navigation (1)Skip section navigation (2)
Date:      14 Feb 1997 12:30:22 -0600
From:      stephen farrell <sfarrell@healthquiz.com>
To:        Brandon Gillespie <brandon@cold.org>
Cc:        Warner Losh <imp@village.org>, security@freebsd.org
Subject:   Re: blowfish passwords in FreeBSD
Message-ID:  <87sp2zkzpd.fsf@phaedrus.uchicago.edu>
In-Reply-To: Brandon Gillespie's message of Fri, 14 Feb 1997 09:21:17 -0700 (MST)
References:  <Pine.NEB.3.95.970214092046.3845B-100000@cold.org>

next in thread | previous in thread | raw e-mail | index | archive | help
Brandon Gillespie <brandon@cold.org> writes:

> 
> On Thu, 13 Feb 1997, Warner Losh wrote:
> > OpenBSD just committed a new encryption method using blowfish.  This
> > has a much larger salt space as well as a much harder to break
> > encryption scheme.  Preliminary indications are that it looks really
> > good.  They implemented this much like md5, but with its own code.
> > 
> > I think we should bring this into FreeBSD.  What do others think?
> 
> How does it compare to SHA?  We've had SHA encryption sitting in PR for a
> few months now, it uses the $2$ 'id'.

here's a pretty cool URL for htis stuff:

<URL:http://www.cs.hut.fi/crypto/algorithms.html>;



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?87sp2zkzpd.fsf>