Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4F23052B.2040309@hushmail.com>
Date: Fri, 27 Jan 2012 21:12:27 +0100
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: OpenCL vs Test Suite

On 01/27/2012 08:40 PM, Samuele Giovanni Tonon wrote:
> On 01/27/12 00:46, magnum wrote:
>> I did not notice some formats have a lower max size than SSE2
>> ones. Hopefully, some of the formats are OK! But ssha-opencl is not :)
>>
> yes ssha-opencl is setted to have password up to 15 chars; this due to
> to speed issue on opencl; however you can switch plaintext_length to
> 32 and there shouldn't be problem .
> 
> one question; on a general side, what is the perfect PLAINTEXT_LENGTH
> value ? 32 is it good enough ?

IMHO yes. On the other hand, how/why is it a bottleneck? If you support
55, but run a crack session with only short (eg. 8 characters)
candidates, is it still a bottleneck? Most intrinsics formats are
limited to 55 byte crypts (for eg. NT, that is just 27 characters)
because beyond that you need to do another crypt call. Good or bad, it's
a very logical limit.

If merely *supporting* longer is always slower and you can't work around
it, I could live with even shorter than 32 - possibly even 16.

magnum

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.