From: | "scott(dot)marlowe" <scott(dot)marlowe(at)ihs(dot)com> |
---|---|
To: | Bruno Wolff III <bruno(at)wolff(dot)to> |
Cc: | "Don V(dot) Soledad" <don(dot)soledad(at)uratex(dot)com(dot)ph>, <pgsql-general(at)postgresql(dot)org> |
Subject: | Re: decrypted pwd |
Date: | 2003-09-08 16:14:47 |
Message-ID: | Pine.LNX.4.33.0309081013550.11557-100000@css120.ihs.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-general |
On Mon, 8 Sep 2003, Bruno Wolff III wrote:
> On Mon, Sep 08, 2003 at 08:53:26 -0600,
> "scott.marlowe" <scott(dot)marlowe(at)ihs(dot)com> wrote:
> > 3: Compare your infinite number of md5 sigs to the one stored for the
> > user. When they match, you've got the original password, or at least a
> > password that will work just like the original.
>
> It is probably worth trying to spend some time trying to find a finite
> set of passwords that are guarenteed to be generators for all possible
> MD5 hashes (or at least those than can possibly occur), so that you can
> finish the computation in finite time.
If I rememberate correctificantly, it would take more storage than all the
atoms in the universe to store all the possible md5 sigs. Or somthing
similarly large. But if it's an excuse to buy a massive storage array,
I'm all for it. :-)
From | Date | Subject | |
---|---|---|---|
Next Message | Matthew T. O'Connor | 2003-09-08 16:24:31 | Re: Does "vacuum analyze" contain "vacuum"? |
Previous Message | scott.marlowe | 2003-09-08 16:01:57 | Re: Inquiry From Form [pgsql] |