Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 15 Feb 1997 08:09:17 -0700
From:      Warner Losh <imp@village.org>
To:        Stephen Fisher <lithium@cia-g.com>
Cc:        security@freebsd.org
Subject:   Re: blowfish passwords in FreeBSD 
Message-ID:  <E0vvljp-0004WN-00@rover.village.org>
In-Reply-To: Your message of "Sat, 15 Feb 1997 00:18:41 MST." <Pine.BSI.3.95.970215001754.17869C-100000@maslow.cia-g.com> 
References:  <Pine.BSI.3.95.970215001754.17869C-100000@maslow.cia-g.com>  

next in thread | previous in thread | raw e-mail | index | archive | help
In message <Pine.BSI.3.95.970215001754.17869C-100000@maslow.cia-g.com> Stephen Fisher writes:
: Where has this been used before though?  MD5 and especially DES have been
: time proven and tested and white papers have been written, and people have
: studied them to death already.

I don't have the references.

However, reports have come in that brute force has cracked 40 and 48
bit keys in less than a month.  Next stop 56 bit keys :-).

Warner



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?E0vvljp-0004WN-00>