From owner-freebsd-security Mon Feb 17 12:15:59 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id MAA11527 for security-outgoing; Mon, 17 Feb 1997 12:15:59 -0800 (PST) Received: from fusion.gage.com (brimstone.gage.com [205.217.2.10]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id MAA11515 for ; Mon, 17 Feb 1997 12:15:52 -0800 (PST) Received: (from mail@localhost) by fusion.gage.com (8.8.3/8.8.4) id OAA13645; Mon, 17 Feb 1997 14:15:41 -0600 (CST) Received: from octopus.gage.com(158.60.57.50) by fusion.gage.com via smap (V2.0beta) id xma013641; Mon, 17 Feb 97 14:15:40 -0600 Received: from squid.gage.com (squid [158.60.57.101]) by octopus.gage.com (8.7.5/8.7.3) with SMTP id OAA01624; Mon, 17 Feb 1997 14:15:39 -0600 (CST) Received: from schemer by squid.gage.com (NX5.67e/NX3.0S) id AA06596; Mon, 17 Feb 97 14:15:38 -0600 Message-Id: <9702172015.AA06596@squid.gage.com> Received: by schemer.gage.com (NX5.67g/NX3.0X) id AA03328; Mon, 17 Feb 97 14:15:37 -0600 Content-Type: text/plain Mime-Version: 1.0 (NeXT Mail 4.0 v146.2) In-Reply-To: <199702171906.LAA14225@saguaro.flyingfox.com> X-Nextstep-Mailer: Mail 3.3 (Enhance 1.3) Received: by NeXT.Mailer (1.146.2) From: Ben Black Date: Mon, 17 Feb 97 14:15:37 -0600 To: Jim Shankland Subject: Re: blowfish passwords in FreeBSD Cc: imp@village.org, phk@critter.dk.tfs.com, lithium@cia-g.com, security@freebsd.org References: <199702171906.LAA14225@saguaro.flyingfox.com> Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk >Hmm. 2^56 possible keys, so on average, you'd need to try 2^55 keys. >Say it takes 2^14 seconds (that's a little more than three hours, but about right); then this board was doing 2^41 encryptions per second, >or roughly 2 million per microsecond. he didn't say it averaged 3 hours. he said it took it 3 hour on a specific key. b3n