Date: Thu, 20 Jun 2002 11:03:57 -0400 From: Antoine Beaupre <anarcat@anarcat.ath.cx> To: Dag-Erling Smorgrav <des@ofug.org> Cc: "Eric F Crist" <ecrist@adtechintegrated.com>, "'Ryan Thompson'" <ryan@sasknow.com>, "'Bill Moran'" <wmoran@potentialtech.com>, <freebsd-security@FreeBSD.ORG> Subject: Re: hash-password length relation (was: Password security) Message-ID: <F1A7E247-845E-11D6-887B-0050E4A0BB3F@anarcat.ath.cx> In-Reply-To: <xzpy9dadmgo.fsf@flood.ping.uio.no>
next in thread | previous in thread | raw e-mail | index | archive | help
Thank you everyone for such quick response. A. Le jeudi 20 juin 2002, =E0 11:00 AM, Dag-Erling Smorgrav a =E9crit : > Antoine Beaupre <anarcat@anarcat.ath.cx> writes: >> Does the length of the encrypted password grow with the length of the >> password? > > Traditional DES always produces a 13-byte hash (including the salt). > MD5 produces a 31-byte hash (also including the salt). Blowfish > produces a 32-byte hash with (IIRC) a variable-length salt of up to 16 > bytes. Both MD5 and Blowfish use a special prefix to identify the > hash algorithm used; it's usually three bytes long for MD5 and five or > six bytes long for Blowfish. > > DES > -- > Dag-Erling Smorgrav - des@ofug.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?F1A7E247-845E-11D6-887B-0050E4A0BB3F>