|
Message-ID: <CANJ2NMO_FCp5gxFWFaCWLpMD77zp7dTK9GAD6cUv3cLutTw4ZQ@mail.gmail.com>
Date: Tue, 17 Apr 2012 15:19:18 +0800
From: myrice <qqlddg@...il.com>
To: john-dev@...ts.openwall.com
Subject: Password Generation on GPU
Hi, Samuele, Solar, all -
On Fri, Apr 13, 2012 at 6:06 PM, Samuele Giovanni Tonon <
samu@...uxasylum.net> wrote:
>
> yup, this is the other PITA with fast hashes:
> with slow GPU the time spent on "hashing" is higher than time spent on
> bus transfer; for this reason changing plaintext_length doesn't affect
> it too much.
>
> Problem arise with newer GPU where "cpu time" is lower than "bandwith
> time" .
> If you all have some time try to change plaintext_length on ssha-opencl
> you will see how it affects the speed; the other
>
> hashcat solved the problem, "sorting" password length from shorter to
> longer; i suspect atom does that so he can create/destroy cl buffers
> accordingly; however i don't know how this could be achieved in john.
>
I agree with you bandwidth may cause the problem. Password generation on
GPU will reduce the transfer time.
For term of "password generation", I just want to make it clear. Do you
mean that in real password generation, the single, wordlist and incremental
mode? I mentioned real because we split benchmark with real password
generation. In benchmark, we just use bench_set_keys(set key from test_fmt
one by one).
For now, I haven't explored so much of these modes. But I am familiar with
ben_set_keys. So if I test it by modifying bench_set_keys, the result is
also meaningful, right?
Thanks!
Dongdong Li
Content of type "text/html" skipped
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.