1995-12-10 - Re: Windows .PWL cracker implemented as a Word Basic virus

Header Data

From: SINCLAIR DOUGLAS N <sinclai@ecf.toronto.edu>
To: perry@piermont.com
Message Hash: a197b28fddfea679e7fcd1fca0f2015fb54940c55e141c57160680d3d4f9a055
Message ID: <95Dec10.175318edt.1732@cannon.ecf.toronto.edu>
Reply To: <199512102214.RAA22512@jekyll.piermont.com>
UTC Datetime: 1995-12-10 22:53:45 UTC
Raw Date: Sun, 10 Dec 95 14:53:45 PST

Raw message

From: SINCLAIR  DOUGLAS N <sinclai@ecf.toronto.edu>
Date: Sun, 10 Dec 95 14:53:45 PST
To: perry@piermont.com
Subject: Re: Windows .PWL cracker implemented as a Word Basic virus
In-Reply-To: <199512102214.RAA22512@jekyll.piermont.com>
Message-ID: <95Dec10.175318edt.1732@cannon.ecf.toronto.edu>
MIME-Version: 1.0
Content-Type: text/plain


> MD4 has been broken. I thought that was common knowledge. MD5 is still
> safe, of course.
> 
> Perry

My understanding was that MD4 had been broken once, at the cost of 
much computer time.  Is it not still considered strong enough for 
casual use, much as a 512-bit RSA key is?




Thread