Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 15 Feb 1997 13:12:45 +1100 (EST)
From:      proff@suburbia.net
To:        mal@bengt.algonet.se (Mats Lofkvist)
Cc:        security@freebsd.org
Subject:   Re: blowfish passwords in FreeBSD
Message-ID:  <19970215021245.1798.qmail@suburbia.net>
In-Reply-To: <199702142048.VAA08594@bengt> from Mats Lofkvist at "Feb 14, 97 09:48:22 pm"

next in thread | previous in thread | raw e-mail | index | archive | help
> Why did they feel the need for something better than md5?
> Is there any known weaknesses in md5? 128 bits is enough to make md5
> extremely secure until someone finds a serious flaw in the algorithm,
> brute force attacks will probably never be a problem.

Further, md5 as a signature algorithm is exportable, while blowfish is
not. md5 does have some flaws, but not in this context.

--
Prof. Julian Assange  |If you want to build a ship, don't drum up people
		      |together to collect wood and don't assign them tasks
proff@iq.org          |and work, but rather teach them to long for the endless
proff@gnu.ai.mit.edu  |immensity of the sea. -- Antoine de Saint Exupery



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19970215021245.1798.qmail>