[EMAIL PROTECTED] wrote:

> > No, it cannot; it is even *theoretically* impossible to brute force a
> > password of that length.  The universe is just not big enough.
> >
> > When 56 bits keys were introduced they were, perhaps, merely infeasible to
> > crack; but it was known that it was theoretically possible within 10-20
> > years, hence the design lifetime of DES.  (Didn't it expire in the 80s or
> > early 90s?)
>
> Possibly in 1984 :)

Not even in the 1970s

DES has been designed for 64 bit keys. Bruce Schneier warned for less than 60 
bits since some time.

The passwd crypt function does 25 times DES for passwords (this was 1 second on 
a PDP-11) and people who use DES for crypting data use at least triple-DES.

It sometimes seems to be the foolery of the poeple.....
In the 1930s we had the 3-rotor Enigma, in the 1940s we had the 5-rotor Enigma.
UNIX implemented a 1-rotor Egnigma in the 1970 (see crypt(1)).

Jörg

-- 
 EMail:[EMAIL PROTECTED] (home) Jörg Schilling D-13353 Berlin
       [EMAIL PROTECTED]                (uni)  
       [EMAIL PROTECTED]     (work) Blog: http://schily.blogspot.com/
 URL:  http://cdrecord.berlios.de/old/private/ ftp://ftp.berlios.de/pub/schily
_______________________________________________
opensolaris-discuss mailing list
[email protected]

Reply via email to