[18250] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: online MD5 crack database

daemon@ATHENA.MIT.EDU (Steve Furlong)
Mon Aug 22 11:33:56 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Mon, 22 Aug 2005 11:09:05 -0400
From: Steve Furlong <demonfighter@gmail.com>
To: cryptography@metzdowd.com
In-Reply-To: <20050822140829.4CF383BFF2F@berkshire.machshav.com>

On 8/22/05, Steven M. Bellovin <smb@cs.columbia.edu> wrote:
> In message <20050822133020.C03571BF906@absinthe.tinho.net>, dan@geer.org =
writes
> :
> >
> >...the folks at Fort Meade had every
> >possible BSD password indexed by its /etc/passwd
> >representation.

> I'm sorry, I flat-out don't believe that.

<snip calculations>

Probably some details were left out in the telling. Such as "all
possible alphanumeric passwords of length 1-16 characters".

--=20
There are no bad teachers, only defective children.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post