Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 15 Feb 1997 08:04:54 +0100
From:      Poul-Henning Kamp <phk@critter.dk.tfs.com>
To:        proff@suburbia.net
Cc:        mal@bengt.algonet.se (Mats Lofkvist), security@FreeBSD.ORG
Subject:   Re: blowfish passwords in FreeBSD 
Message-ID:  <11871.855990294@critter.dk.tfs.com>
In-Reply-To: Your message of "Sat, 15 Feb 1997 13:12:45 %2B1100." <19970215021245.1798.qmail@suburbia.net> 

next in thread | previous in thread | raw e-mail | index | archive | help
In message <19970215021245.1798.qmail@suburbia.net>, proff@suburbia.net writes:
>> Why did they feel the need for something better than md5?
>> Is there any known weaknesses in md5? 128 bits is enough to make md5
>> extremely secure until someone finds a serious flaw in the algorithm,
>> brute force attacks will probably never be a problem.
>
>Further, md5 as a signature algorithm is exportable, while blowfish is
>not. md5 does have some flaws, but not in this context.

Theo belives he can export anything just because he is in Canada.

--
Poul-Henning Kamp           | phk@FreeBSD.ORG       FreeBSD Core-team.
http://www.freebsd.org/~phk | phk@login.dknet.dk    Private mailbox.
whois: [PHK]                | phk@tfs.com           TRW Financial Systems, Inc.
Power and ignorance is a disgusting cocktail.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?11871.855990294>