Re: Passwords

From: Adam Duke (aduke@SCRI.FSU.EDU)
Date: 11/17/97


Using the technology publicly available today, it would take near 10 to
the 25th power years to reverse a good one-way hash... while crypt is not
the best one-way hash routine around, it would still take an incredibly
large amount of time to reverse it. The only reasonable way of finding the
plaintext is to guess it by encrypting your guess with the same salt and
then matching them. Just a little FYI. :)

                                                -Adam Duke
                                              aduke@scri.fsu.edu
On Sun, 16 Nov 1997, j f chaos wrote:

> On Sat, 15 Nov 1997 18:01:45 -0600 Chris Powell <darkness@AGEOFWAR.ORG>
> writes:
> >Is there a way to UNCRYPT passwds?
> >
>    It's possible to get a probable match of the password, but the Unix
> crypt() makes it damn near impossible to decrypt a password.
>
> Reading the man file for crypt would give more insight.
>
> Lord Chaos
>
>
>      +------------------------------------------------------------+
>      | Ensure that you have read the CircleMUD Mailing List FAQ:  |
>      | http://democracy.queensu.ca/~fletcher/Circle/list-faq.html |
>      +------------------------------------------------------------+
>


     +------------------------------------------------------------+
     | Ensure that you have read the CircleMUD Mailing List FAQ:  |
     | http://democracy.queensu.ca/~fletcher/Circle/list-faq.html |
     +------------------------------------------------------------+



This archive was generated by hypermail 2b30 : 12/08/00 PST