Date: Sat, 15 Feb 1997 08:04:54 +0100 From: Poul-Henning Kamp <phk@critter.dk.tfs.com> To: proff@suburbia.net Cc: mal@bengt.algonet.se (Mats Lofkvist), security@FreeBSD.ORG Subject: Re: blowfish passwords in FreeBSD Message-ID: <11871.855990294@critter.dk.tfs.com> In-Reply-To: Your message of "Sat, 15 Feb 1997 13:12:45 %2B1100." <19970215021245.1798.qmail@suburbia.net>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <19970215021245.1798.qmail@suburbia.net>, proff@suburbia.net writes: >> Why did they feel the need for something better than md5? >> Is there any known weaknesses in md5? 128 bits is enough to make md5 >> extremely secure until someone finds a serious flaw in the algorithm, >> brute force attacks will probably never be a problem. > >Further, md5 as a signature algorithm is exportable, while blowfish is >not. md5 does have some flaws, but not in this context. Theo belives he can export anything just because he is in Canada. -- Poul-Henning Kamp | phk@FreeBSD.ORG FreeBSD Core-team. http://www.freebsd.org/~phk | phk@login.dknet.dk Private mailbox. whois: [PHK] | phk@tfs.com TRW Financial Systems, Inc. Power and ignorance is a disgusting cocktail.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?11871.855990294>