Date: Mon, 17 Feb 97 14:15:37 -0600 From: Ben Black <black@gage.com> To: Jim Shankland <jas@flyingfox.COM> Cc: imp@village.org, phk@critter.dk.tfs.com, lithium@cia-g.com, security@freebsd.org Subject: Re: blowfish passwords in FreeBSD Message-ID: <9702172015.AA06596@squid.gage.com> In-Reply-To: <199702171906.LAA14225@saguaro.flyingfox.com> References: <199702171906.LAA14225@saguaro.flyingfox.com>
next in thread | previous in thread | raw e-mail | index | archive | help
>Hmm. 2^56 possible keys, so on average, you'd need to try 2^55 keys. >Say it takes 2^14 seconds (that's a little more than three hours, but about right); then this board was doing 2^41 encryptions per second, >or roughly 2 million per microsecond. he didn't say it averaged 3 hours. he said it took it 3 hour on a specific key. b3n
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?9702172015.AA06596>