Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 15 Feb 1997 10:41:11 +0100
From:      roberto@keltia.freenix.fr (Ollivier Robert)
To:        freebsd-security@FreeBSD.ORG
Subject:   Re: blowfish passwords in FreeBSD
Message-ID:  <19970215104111.CY55466@keltia.freenix.fr>
In-Reply-To: <Pine.SUN.3.94.970214180127.22842A-100000@dfw.dfw.net>; from Aleph One on Feb 14, 1997 18:05:28 -0600
References:  <199702142048.VAA08594@bengt> <Pine.SUN.3.94.970214180127.22842A-100000@dfw.dfw.net>

next in thread | previous in thread | raw e-mail | index | archive | help
According to Aleph One:
> Well pseudo-collision have been found in MD5. It has also been estimated
> that for 10 million 1994 dollars you could build a collision search
> machine that could find a collision in 24 days on average. Of curse this
> doesnt mean much to anyone using MD5 for their passwords. For 10 million

There is a good description of RIPEMD-160 in the DDJ on compression /
encryption. Seems to be a good algorithm.
-- 
Ollivier ROBERT    -=- The daemon is FREE! -=-    roberto@keltia.freenix.fr
  FreeBSD keltia.freenix.fr 3.0-CURRENT #39: Sun Feb  2 22:12:44 CET 1997



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19970215104111.CY55466>