From: “Perry E. Metzger” <perry@piermont.com>
To: SINCLAIR DOUGLAS N <sinclai@ecf.toronto.edu>
Message Hash: a793605c6fa994233c5d351fe93b6649911feb7ae27bd79f48d112e373b80874
Message ID: <199512102256.RAA22618@jekyll.piermont.com>
Reply To: <95Dec10.175318edt.1732@cannon.ecf.toronto.edu>
UTC Datetime: 1995-12-10 22:56:29 UTC
Raw Date: Sun, 10 Dec 95 14:56:29 PST
From: "Perry E. Metzger" <perry@piermont.com>
Date: Sun, 10 Dec 95 14:56:29 PST
To: SINCLAIR DOUGLAS N <sinclai@ecf.toronto.edu>
Subject: Re: Windows .PWL cracker implemented as a Word Basic virus
In-Reply-To: <95Dec10.175318edt.1732@cannon.ecf.toronto.edu>
Message-ID: <199512102256.RAA22618@jekyll.piermont.com>
MIME-Version: 1.0
Content-Type: text/plain
SINCLAIR DOUGLAS N writes:
> My understanding was that MD4 had been broken once, at the cost of
> much computer time. Is it not still considered strong enough for
> casual use, much as a 512-bit RSA key is?
You can get export licenses for systems using 512 bit RSA.
I'll leave the rest to your imagination.
I generally don't believe in using stupid algorithms if good ones are
around and cost no more. MD5 isn't more expensive than MD4 except if
you are in some very borderline sort of case.
Perry
Return to December 1995
Return to “SINCLAIR DOUGLAS N <sinclai@ecf.toronto.edu>”