- The algorithms in crypt()> differ from usual hashing algorithms
- like MD5 or SHA1 in the following respects:
+ The algorithms in crypt()> differ from the usual
+ MD5 or SHA1 hashing algorithms in the following respects:
Max Password Length
Adaptive?
Salt Bits
+ Output length
Description
72
yes
128
+ 60
Blowfish-based, variant 2a
|
unlimited
no
48
+ 34
MD5-based crypt
|
8
yes
24
+ 20
Extended DES
|
8
no
12
+ 13
Original UNIX crypt
Example of authentication:
-SELECT pswhash = crypt('entered password', pswhash) FROM ... ;
+SELECT (pswhash = crypt('entered password', pswhash)) AS pswmatch FROM ... ;
This returns true> if the entered password is correct.
12 years
|
- md5>
+ md5 hash>
2345086
1 day
3 years
- md5> numbers are from mdcrack 1.2.
+ md5 hash> numbers are from mdcrack 1.2.
OpenBSD sys/crypto
|
- MD5 and SHA1
+ MD5 hash and SHA1
WIDE Project
KAME kame/sys/crypto