From: SINCLAIR DOUGLAS N <sinclai@ecf.toronto.edu>
To: perry@piermont.com
Message Hash: a197b28fddfea679e7fcd1fca0f2015fb54940c55e141c57160680d3d4f9a055
Message ID: <95Dec10.175318edt.1732@cannon.ecf.toronto.edu>
Reply To: <199512102214.RAA22512@jekyll.piermont.com>
UTC Datetime: 1995-12-10 22:53:45 UTC
Raw Date: Sun, 10 Dec 95 14:53:45 PST
From: SINCLAIR DOUGLAS N <sinclai@ecf.toronto.edu>
Date: Sun, 10 Dec 95 14:53:45 PST
To: perry@piermont.com
Subject: Re: Windows .PWL cracker implemented as a Word Basic virus
In-Reply-To: <199512102214.RAA22512@jekyll.piermont.com>
Message-ID: <95Dec10.175318edt.1732@cannon.ecf.toronto.edu>
MIME-Version: 1.0
Content-Type: text/plain
> MD4 has been broken. I thought that was common knowledge. MD5 is still
> safe, of course.
>
> Perry
My understanding was that MD4 had been broken once, at the cost of
much computer time. Is it not still considered strong enough for
casual use, much as a 512-bit RSA key is?
Return to December 1995
Return to “SINCLAIR DOUGLAS N <sinclai@ecf.toronto.edu>”