Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 17 Feb 97 14:15:37 -0600
From:      Ben Black <black@gage.com>
To:        Jim Shankland <jas@flyingfox.COM>
Cc:        imp@village.org, phk@critter.dk.tfs.com, lithium@cia-g.com, security@freebsd.org
Subject:   Re: blowfish passwords in FreeBSD
Message-ID:  <9702172015.AA06596@squid.gage.com>
In-Reply-To: <199702171906.LAA14225@saguaro.flyingfox.com>
References:  <199702171906.LAA14225@saguaro.flyingfox.com>

next in thread | previous in thread | raw e-mail | index | archive | help
>Hmm.  2^56 possible keys, so on average, you'd need to try 2^55 keys.
>Say it takes 2^14 seconds (that's a little more than three hours, but
about right); then this board was doing 2^41 encryptions per second,
>or roughly 2 million per microsecond.

he didn't say it averaged 3 hours.  he said it took it 3 hour on a specific key.


b3n



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?9702172015.AA06596>