Date: Fri, 14 Feb 1997 21:48:22 +0100 From: Mats Lofkvist <mal@bengt.algonet.se> To: freebsd-security@FreeBSD.ORG Subject: Re: blowfish passwords in FreeBSD Message-ID: <199702142048.VAA08594@bengt>
next in thread | raw e-mail | index | archive | help
> OpenBSD just committed a new encryption method using blowfish. This > has a much larger salt space as well as a much harder to break > encryption scheme. Preliminary indications are that it looks really > good. They implemented this much like md5, but with its own code. > > I think we should bring this into FreeBSD. What do others think? > > Warner Why did they feel the need for something better than md5? Is there any known weaknesses in md5? 128 bits is enough to make md5 extremely secure until someone finds a serious flaw in the algorithm, brute force attacks will probably never be a problem. _ Mats Lofkvist mal@algonet.se
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199702142048.VAA08594>