On Fri, 19 Mar 2010 23:26:18 -0400 John Reames <jwrea...@comcast.net>
wrote:

> Decryption of the standard UNIX crypt() function is not possible by  
> design.
> 
> Passwords were only stored in encrypted format, so whenever a password  
> was checked, the provided candidate was crypt()ed and the two crypt() 
> ed strings were compared

Having worked with Unix systems since 1983, I knew that. But I thought
maybe someone has figured out how to crack them.


>> And the standard UNIX password encryption (the "weak" one, not /etc/
>> shadow) took 1 second to execute on a VAX 11/780... An intel Q6700  
>> can do 8.8M crypt()'s per second, and a PS/3 can do 11.1M...

Sure shows how things have progressed, doesn't it?


Craig

_______________________________________
http://www.okiebenz.com
For new and used parts go to www.okiebenz.com
To search list archives http://www.okiebenz.com/archive/

To Unsubscribe or change delivery options go to:
http://okiebenz.com/mailman/listinfo/mercedes_okiebenz.com

Reply via email to