Date: Sat, 15 Feb 1997 17:29:56 +0100 From: Poul-Henning Kamp <phk@critter.dk.tfs.com> To: Warner Losh <imp@village.org> Cc: Stephen Fisher <lithium@cia-g.com>, security@FreeBSD.ORG Subject: Re: blowfish passwords in FreeBSD Message-ID: <13474.856024196@critter.dk.tfs.com> In-Reply-To: Your message of "Sat, 15 Feb 1997 08:09:17 MST." <E0vvljp-0004WN-00@rover.village.org>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <E0vvljp-0004WN-00@rover.village.org>, Warner Losh writes: >In message <Pine.BSI.3.95.970215001754.17869C-100000@maslow.cia-g.com> Stephen > Fisher writes: >: Where has this been used before though? MD5 and especially DES have been >: time proven and tested and white papers have been written, and people have >: studied them to death already. > >I don't have the references. > >However, reports have come in that brute force has cracked 40 and 48 >bit keys in less than a month. Next stop 56 bit keys :-). I have personally witnessed a P5/60 with a ISA card with some ASIC's break a well chosen password that was DES encrypted using bruteforce. It took slightly less than 3 hours. -- Poul-Henning Kamp | phk@FreeBSD.ORG FreeBSD Core-team. http://www.freebsd.org/~phk | phk@login.dknet.dk Private mailbox. whois: [PHK] | phk@tfs.com TRW Financial Systems, Inc. Power and ignorance is a disgusting cocktail.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?13474.856024196>