Re: decrypted pwd

From: "scott(dot)marlowe" <scott(dot)marlowe(at)ihs(dot)com>
To: Bruno Wolff III <bruno(at)wolff(dot)to>
Cc: "Don V(dot) Soledad" <don(dot)soledad(at)uratex(dot)com(dot)ph>, <pgsql-general(at)postgresql(dot)org>
Subject: Re: decrypted pwd
Date: 2003-09-08 16:14:47
Message-ID: Pine.LNX.4.33.0309081013550.11557-100000@css120.ihs.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-general

On Mon, 8 Sep 2003, Bruno Wolff III wrote:

> On Mon, Sep 08, 2003 at 08:53:26 -0600,
> "scott.marlowe" <scott(dot)marlowe(at)ihs(dot)com> wrote:
> > 3: Compare your infinite number of md5 sigs to the one stored for the
> > user. When they match, you've got the original password, or at least a
> > password that will work just like the original.
>
> It is probably worth trying to spend some time trying to find a finite
> set of passwords that are guarenteed to be generators for all possible
> MD5 hashes (or at least those than can possibly occur), so that you can
> finish the computation in finite time.

If I rememberate correctificantly, it would take more storage than all the
atoms in the universe to store all the possible md5 sigs. Or somthing
similarly large. But if it's an excuse to buy a massive storage array,
I'm all for it. :-)

In response to

Responses

Browse pgsql-general by date

  From Date Subject
Next Message Matthew T. O'Connor 2003-09-08 16:24:31 Re: Does "vacuum analyze" contain "vacuum"?
Previous Message scott.marlowe 2003-09-08 16:01:57 Re: Inquiry From Form [pgsql]