Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 15 Feb 1997 17:12:44 +0100 (MET)
From:      Mikael Karpberg <karpen@ocean.campus.luth.se>
To:        imp@village.org (Warner Losh)
Cc:        lithium@cia-g.com, security@freebsd.org
Subject:   Re: blowfish passwords in FreeBSD
Message-ID:  <199702151612.RAA04441@ocean.campus.luth.se>
In-Reply-To: <E0vvljp-0004WN-00@rover.village.org> from Warner Losh at "Feb 15, 97 08:09:17 am"

next in thread | previous in thread | raw e-mail | index | archive | help
According to Warner Losh:
> Stephen Fisher writes:
> : Where has this been used before though?  MD5 and especially DES have been
> : time proven and tested and white papers have been written, and people have
> : studied them to death already.
> 
> I don't have the references.
> 
> However, reports have come in that brute force has cracked 40 and 48
> bit keys in less than a month.  Next stop 56 bit keys :-).

Try http://www.42.org/challenge/ :-)

  /Mikael




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199702151612.RAA04441>