Date: Sat, 15 Feb 1997 17:12:44 +0100 (MET) From: Mikael Karpberg <karpen@ocean.campus.luth.se> To: imp@village.org (Warner Losh) Cc: lithium@cia-g.com, security@freebsd.org Subject: Re: blowfish passwords in FreeBSD Message-ID: <199702151612.RAA04441@ocean.campus.luth.se> In-Reply-To: <E0vvljp-0004WN-00@rover.village.org> from Warner Losh at "Feb 15, 97 08:09:17 am"
next in thread | previous in thread | raw e-mail | index | archive | help
According to Warner Losh: > Stephen Fisher writes: > : Where has this been used before though? MD5 and especially DES have been > : time proven and tested and white papers have been written, and people have > : studied them to death already. > > I don't have the references. > > However, reports have come in that brute force has cracked 40 and 48 > bit keys in less than a month. Next stop 56 bit keys :-). Try http://www.42.org/challenge/ :-) /Mikael
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199702151612.RAA04441>