Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 15 Feb 1997 17:29:56 +0100
From:      Poul-Henning Kamp <phk@critter.dk.tfs.com>
To:        Warner Losh <imp@village.org>
Cc:        Stephen Fisher <lithium@cia-g.com>, security@FreeBSD.ORG
Subject:   Re: blowfish passwords in FreeBSD 
Message-ID:  <13474.856024196@critter.dk.tfs.com>
In-Reply-To: Your message of "Sat, 15 Feb 1997 08:09:17 MST." <E0vvljp-0004WN-00@rover.village.org> 

next in thread | previous in thread | raw e-mail | index | archive | help
In message <E0vvljp-0004WN-00@rover.village.org>, Warner Losh writes:
>In message <Pine.BSI.3.95.970215001754.17869C-100000@maslow.cia-g.com> Stephen
> Fisher writes:
>: Where has this been used before though?  MD5 and especially DES have been
>: time proven and tested and white papers have been written, and people have
>: studied them to death already.
>
>I don't have the references.
>
>However, reports have come in that brute force has cracked 40 and 48
>bit keys in less than a month.  Next stop 56 bit keys :-).

I have personally witnessed a P5/60 with a ISA card with some ASIC's
break a well chosen password that was DES encrypted using bruteforce.

It took slightly less than 3 hours.

--
Poul-Henning Kamp           | phk@FreeBSD.ORG       FreeBSD Core-team.
http://www.freebsd.org/~phk | phk@login.dknet.dk    Private mailbox.
whois: [PHK]                | phk@tfs.com           TRW Financial Systems, Inc.
Power and ignorance is a disgusting cocktail.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?13474.856024196>