Date: Sat, 15 Feb 1997 10:41:11 +0100 From: roberto@keltia.freenix.fr (Ollivier Robert) To: freebsd-security@FreeBSD.ORG Subject: Re: blowfish passwords in FreeBSD Message-ID: <19970215104111.CY55466@keltia.freenix.fr> In-Reply-To: <Pine.SUN.3.94.970214180127.22842A-100000@dfw.dfw.net>; from Aleph One on Feb 14, 1997 18:05:28 -0600 References: <199702142048.VAA08594@bengt> <Pine.SUN.3.94.970214180127.22842A-100000@dfw.dfw.net>
next in thread | previous in thread | raw e-mail | index | archive | help
According to Aleph One: > Well pseudo-collision have been found in MD5. It has also been estimated > that for 10 million 1994 dollars you could build a collision search > machine that could find a collision in 24 days on average. Of curse this > doesnt mean much to anyone using MD5 for their passwords. For 10 million There is a good description of RIPEMD-160 in the DDJ on compression / encryption. Seems to be a good algorithm. -- Ollivier ROBERT -=- The daemon is FREE! -=- roberto@keltia.freenix.fr FreeBSD keltia.freenix.fr 3.0-CURRENT #39: Sun Feb 2 22:12:44 CET 1997
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19970215104111.CY55466>