home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!cis.ohio-state.edu!zaphod.mps.ohio-state.edu!moe.ksu.ksu.edu!phys.ksu.edu!rjq
- From: rjq@phys.ksu.edu (Rob Quinn)
- Newsgroups: alt.security
- Subject: Re: passwd security check
- Date: 23 Jul 1992 14:44:26 GMT
- Organization: Kansas State University
- Lines: 14
- Message-ID: <14mgkaINN1uq@moe.ksu.ksu.edu>
- References: <1992Jul22.190827.30077@iitmax.iit.edu> <1992Jul22.221222.6185@Princeton.EDU> <1992Jul23.092715.1@zodiac.rutgers.edu>
- NNTP-Posting-Host: bohr.phys.ksu.edu
-
- In <1992Jul23.092715.1@zodiac.rutgers.edu> leichter@zodiac.rutgers.edu writes:
- ]One thing it's important to remember is that there are many passwords that
- ]hash to the same value. Even if you and I have the same salt and the same
- ]hash value, it doesn't mean we chose the same password - though it DOES mean
- ]that either of our passwords will work on either account.
-
- Can you provide an example? Or is there some mathematical proof? This question
- has come up a lot before, and there have been answers on both sides, but no
- proof either way that I have seen.
-
- --
- | Rob Quinn |
- | rjq@phys.ksu.edu |
- | QuinnBob@KSUVM.BITNET |
-