Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 14 Feb 1997 21:48:22 +0100
From:      Mats Lofkvist <mal@bengt.algonet.se>
To:        freebsd-security@FreeBSD.ORG
Subject:   Re: blowfish passwords in FreeBSD
Message-ID:  <199702142048.VAA08594@bengt>

next in thread | raw e-mail | index | archive | help
> OpenBSD just committed a new encryption method using blowfish.  This
> has a much larger salt space as well as a much harder to break
> encryption scheme.  Preliminary indications are that it looks really
> good.  They implemented this much like md5, but with its own code.
>
> I think we should bring this into FreeBSD.  What do others think?
>
> Warner

Why did they feel the need for something better than md5?
Is there any known weaknesses in md5? 128 bits is enough to make md5
extremely secure until someone finds a serious flaw in the algorithm,
brute force attacks will probably never be a problem.

      _
Mats Lofkvist
mal@algonet.se





Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199702142048.VAA08594>