Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 15 Feb 1997 09:33:18 -0800 (PST)
From:      "Eric J. Schwertfeger" <ejs@bfd.com>
To:        Warner Losh <imp@village.org>
Cc:        Stephen Fisher <lithium@cia-g.com>, security@freebsd.org
Subject:   Re: blowfish passwords in FreeBSD 
Message-ID:  <Pine.BSF.3.95.970215093146.7392C-100000@harlie>
In-Reply-To: <E0vvljp-0004WN-00@rover.village.org>

next in thread | previous in thread | raw e-mail | index | archive | help


On Sat, 15 Feb 1997, Warner Losh wrote:

> However, reports have come in that brute force has cracked 40 and 48
> bit keys in less than a month.  Next stop 56 bit keys :-).

4 hours and 13 days, if I remember correctly, If you're referring to RSA's
contest (challenge?  They HAD to know that it would be broken).




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.95.970215093146.7392C-100000>