Using the technology publicly available today, it would take near 10 to the 25th power years to reverse a good one-way hash... while crypt is not the best one-way hash routine around, it would still take an incredibly large amount of time to reverse it. The only reasonable way of finding the plaintext is to guess it by encrypting your guess with the same salt and then matching them. Just a little FYI. :) -Adam Duke aduke@scri.fsu.edu On Sun, 16 Nov 1997, j f chaos wrote: > On Sat, 15 Nov 1997 18:01:45 -0600 Chris Powell <darkness@AGEOFWAR.ORG> > writes: > >Is there a way to UNCRYPT passwds? > > > It's possible to get a probable match of the password, but the Unix > crypt() makes it damn near impossible to decrypt a password. > > Reading the man file for crypt would give more insight. > > Lord Chaos > > > +------------------------------------------------------------+ > | Ensure that you have read the CircleMUD Mailing List FAQ: | > | http://democracy.queensu.ca/~fletcher/Circle/list-faq.html | > +------------------------------------------------------------+ > +------------------------------------------------------------+ | Ensure that you have read the CircleMUD Mailing List FAQ: | | http://democracy.queensu.ca/~fletcher/Circle/list-faq.html | +------------------------------------------------------------+
This archive was generated by hypermail 2b30 : 12/08/00 PST