[45120] in Cypherpunks
Re: Windows .PWL cracker implemented as a Word Basic virus
daemon@ATHENA.MIT.EDU (Perry E. Metzger)
Sun Dec 10 18:06:36 1995
To: SINCLAIR DOUGLAS N <sinclai@ecf.toronto.edu>
Cc: perry@piermont.com, cypherpunks@toad.com
In-Reply-To: Your message of "Sun, 10 Dec 1995 17:53:16 EST."
<95Dec10.175318edt.1732@cannon.ecf.toronto.edu>
Reply-To: perry@piermont.com
Date: Sun, 10 Dec 1995 17:56:11 -0500
From: "Perry E. Metzger" <perry@piermont.com>
SINCLAIR DOUGLAS N writes:
> My understanding was that MD4 had been broken once, at the cost of
> much computer time. Is it not still considered strong enough for
> casual use, much as a 512-bit RSA key is?
You can get export licenses for systems using 512 bit RSA.
I'll leave the rest to your imagination.
I generally don't believe in using stupid algorithms if good ones are
around and cost no more. MD5 isn't more expensive than MD4 except if
you are in some very borderline sort of case.
Perry