This archive is retained to ensure existing URLs remain functional. It will not contain any emails sent to this mailing list after July 1, 2024. For all messages, including those sent before and after this date, please visit the new location of the archive at https://mailman.ripe.net/archives/list/[email protected]/
MD5 proposal
- Previous message (by thread): MD5 proposal
- Next message (by thread): MD5 proposal
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Poul-Henning Kamp
phk at critter.freebsd.dk
Wed Mar 27 18:03:16 CET 2002
In message <3CA1F83A.80802 at ripe.net>, Andrei Robachevsky writes: >My main concern here would be that basing the proposed method on an >implementation (md5-crypt), which may change or may be mixed with some >other implementation, rather than on the documented algorithm (md5 >hash), which cannot, may cause confusion in the future. The implementation will not change, it would screw all cisco router enable passwords and most FreeBSD passwords. >And, as a side question from a person far from cryptography, is it a >proved fact that iterative complexity of md5-crypt makes the hash better? It makes dictionary attacks harder and more timeconsuming, it also makes it harder to do hardware implementations because you need many times more hardware. -- Poul-Henning Kamp | UNIX since Zilog Zeus 3.20 phk at FreeBSD.ORG | TCP/IP since RFC 956 FreeBSD committer | BSD since 4.3-tahoe Never attribute to malice what can adequately be explained by incompetence.
- Previous message (by thread): MD5 proposal
- Next message (by thread): MD5 proposal
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
[ db-wg Archives ]