Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 20 Jun 2002 11:03:57 -0400
From:      Antoine Beaupre <anarcat@anarcat.ath.cx>
To:        Dag-Erling Smorgrav <des@ofug.org>
Cc:        "Eric F Crist" <ecrist@adtechintegrated.com>, "'Ryan Thompson'" <ryan@sasknow.com>, "'Bill Moran'" <wmoran@potentialtech.com>, <freebsd-security@FreeBSD.ORG>
Subject:   Re: hash-password length relation (was: Password security)
Message-ID:  <F1A7E247-845E-11D6-887B-0050E4A0BB3F@anarcat.ath.cx>
In-Reply-To: <xzpy9dadmgo.fsf@flood.ping.uio.no>

next in thread | previous in thread | raw e-mail | index | archive | help
Thank you everyone for such quick response.

A.

Le jeudi 20 juin 2002, =E0 11:00 AM, Dag-Erling Smorgrav a =E9crit :

> Antoine Beaupre <anarcat@anarcat.ath.cx> writes:
>> Does the length of the encrypted password grow with the length of the
>> password?
>
> Traditional DES always produces a 13-byte hash (including the salt).
> MD5 produces a 31-byte hash (also including the salt).  Blowfish
> produces a 32-byte hash with (IIRC) a variable-length salt of up to 16
> bytes.  Both MD5 and Blowfish use a special prefix to identify the
> hash algorithm used; it's usually three bytes long for MD5 and five or
> six bytes long for Blowfish.
>
> DES
> --
> Dag-Erling Smorgrav - des@ofug.org


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?F1A7E247-845E-11D6-887B-0050E4A0BB3F>