Date: Sat, 15 Feb 1997 08:09:17 -0700 From: Warner Losh <imp@village.org> To: Stephen Fisher <lithium@cia-g.com> Cc: security@freebsd.org Subject: Re: blowfish passwords in FreeBSD Message-ID: <E0vvljp-0004WN-00@rover.village.org> In-Reply-To: Your message of "Sat, 15 Feb 1997 00:18:41 MST." <Pine.BSI.3.95.970215001754.17869C-100000@maslow.cia-g.com> References: <Pine.BSI.3.95.970215001754.17869C-100000@maslow.cia-g.com>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <Pine.BSI.3.95.970215001754.17869C-100000@maslow.cia-g.com> Stephen Fisher writes: : Where has this been used before though? MD5 and especially DES have been : time proven and tested and white papers have been written, and people have : studied them to death already. I don't have the references. However, reports have come in that brute force has cracked 40 and 48 bit keys in less than a month. Next stop 56 bit keys :-). Warner
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?E0vvljp-0004WN-00>