Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 15 Feb 1997 07:42:49 +0100
From:      Poul-Henning Kamp <phk@critter.dk.tfs.com>
To:        Mats Lofkvist <mal@bengt.algonet.se>
Cc:        freebsd-security@freebsd.org
Subject:   Re: blowfish passwords in FreeBSD 
Message-ID:  <11721.855988969@critter.dk.tfs.com>
In-Reply-To: Your message of "Fri, 14 Feb 1997 21:48:22 %2B0100." <199702142048.VAA08594@bengt> 

next in thread | previous in thread | raw e-mail | index | archive | help
In message <199702142048.VAA08594@bengt>, Mats Lofkvist writes:
>> OpenBSD just committed a new encryption method using blowfish.  This
>> has a much larger salt space as well as a much harder to break
>> encryption scheme.  Preliminary indications are that it looks really
>> good.  They implemented this much like md5, but with its own code.
>>
>> I think we should bring this into FreeBSD.  What do others think?
>>
>> Warner
>
>Why did they feel the need for something better than md5?
>Is there any known weaknesses in md5? 128 bits is enough to make md5
>extremely secure until someone finds a serious flaw in the algorithm,
>brute force attacks will probably never be a problem.

Because Theo is paranoid.

--
Poul-Henning Kamp           | phk@FreeBSD.ORG       FreeBSD Core-team.
http://www.freebsd.org/~phk | phk@login.dknet.dk    Private mailbox.
whois: [PHK]                | phk@tfs.com           TRW Financial Systems, Inc.
Power and ignorance is a disgusting cocktail.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?11721.855988969>