Makes sense, except if you use upper and lowercase characters,
numbers, and symbols (as you should for secure passwords). I
would think that with these kind of passwords, storing the sheer
number of posibilites would get slightly large. And I mean even
if it is easy to break, it's more secure then storing them clear
text.

Adam Voigt
[EMAIL PROTECTED]

On Wed, 2002-08-14 at 02:20, Robert Parker wrote:
> On Tuesday 13 August 2002 10:57 am, you wrote:
> > MD5 encryption of passwords is secure since you do not need to decrypt the
> > password ever (in fact you can't).  You just encrypt the password that the
> > user entered and check if the MD5 of each password is the same, then the
> > user most likely entered the correct password.
> 
> I don't remember where I read this but it only takes the crackers about 1 - 2 
> seconds to crack your average MD5 encrypted password. This is quite logical
> because all they had to do is make a database of all of the MD5 sums of all 
> the passwords in the various dictionaries.
> The only Linux distro in my (limited) experience that gave the option of MD5 
> encryption of passwords was Debian 2. Even then you had the option of shadow 
> password files instead. Debian 2 is quite old. Later distros such as Mandrake 
> 8.0 and up simply use shadow password files without other option.
> 
> Regards
> Bob Parker
> 
> -- 
> PHP General Mailing List (http://www.php.net/)
> To unsubscribe, visit: http://www.php.net/unsub.php
> 



-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to