Date: Sat, 15 Feb 1997 13:12:45 +1100 (EST) From: proff@suburbia.net To: mal@bengt.algonet.se (Mats Lofkvist) Cc: security@freebsd.org Subject: Re: blowfish passwords in FreeBSD Message-ID: <19970215021245.1798.qmail@suburbia.net> In-Reply-To: <199702142048.VAA08594@bengt> from Mats Lofkvist at "Feb 14, 97 09:48:22 pm"
next in thread | previous in thread | raw e-mail | index | archive | help
> Why did they feel the need for something better than md5? > Is there any known weaknesses in md5? 128 bits is enough to make md5 > extremely secure until someone finds a serious flaw in the algorithm, > brute force attacks will probably never be a problem. Further, md5 as a signature algorithm is exportable, while blowfish is not. md5 does have some flaws, but not in this context. -- Prof. Julian Assange |If you want to build a ship, don't drum up people |together to collect wood and don't assign them tasks proff@iq.org |and work, but rather teach them to long for the endless proff@gnu.ai.mit.edu |immensity of the sea. -- Antoine de Saint Exupery
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19970215021245.1798.qmail>