Date: Sat, 15 Feb 1997 07:42:49 +0100 From: Poul-Henning Kamp <phk@critter.dk.tfs.com> To: Mats Lofkvist <mal@bengt.algonet.se> Cc: freebsd-security@freebsd.org Subject: Re: blowfish passwords in FreeBSD Message-ID: <11721.855988969@critter.dk.tfs.com> In-Reply-To: Your message of "Fri, 14 Feb 1997 21:48:22 %2B0100." <199702142048.VAA08594@bengt>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <199702142048.VAA08594@bengt>, Mats Lofkvist writes: >> OpenBSD just committed a new encryption method using blowfish. This >> has a much larger salt space as well as a much harder to break >> encryption scheme. Preliminary indications are that it looks really >> good. They implemented this much like md5, but with its own code. >> >> I think we should bring this into FreeBSD. What do others think? >> >> Warner > >Why did they feel the need for something better than md5? >Is there any known weaknesses in md5? 128 bits is enough to make md5 >extremely secure until someone finds a serious flaw in the algorithm, >brute force attacks will probably never be a problem. Because Theo is paranoid. -- Poul-Henning Kamp | phk@FreeBSD.ORG FreeBSD Core-team. http://www.freebsd.org/~phk | phk@login.dknet.dk Private mailbox. whois: [PHK] | phk@tfs.com TRW Financial Systems, Inc. Power and ignorance is a disgusting cocktail.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?11721.855988969>