|
Message-ID: <CANJ2NMMNU3iC3mzrMJZMQOMTFMqrdEFGDBKBjETzvtSwQTEvNQ@mail.gmail.com> Date: Mon, 21 May 2012 22:34:21 +0800 From: myrice <qqlddg@...il.com> To: john-dev@...ts.openwall.com Subject: Re: Long Password Length Status Hi, all Here are long password support status. I used two array to store password. One is short length with length currently set to 16. The other is the extend array with (125-16). In one crypt_all() invoking, if there is a long password, the two arrays are needed to transfer to GPU. Otherwise, if no password length larger than 16, I only transfer the array with short length. Here are the result All password candidates are short: Benchmarking: Mac OS X 10.7+ salted SHA-512 [CUDA]... DONE Many salts: 65925K c/s real, 66584K c/s virtual Only one salt: 30247K c/s real, 30247K c/s virtual Some of the password candidates: 1/4 number of long password: Benchmarking: Mac OS X 10.7+ salted SHA-512 [CUDA]... DONE Many salts: 61086K c/s real, 61086K c/s virtual Only one salt: 26214K c/s real, 26214K c/s virtual When the long password candidates is 1/2 ( 2 short + 2 long in fmt_test), Benchmarking: Mac OS X 10.7+ salted SHA-512 [CUDA]... DONE Many salts: 60531K c/s real, 59986K c/s virtual Only one salt: 26214K c/s real, 17476K c/s virtual I find virtual is a lot slow in this case. And the real actually may jump to 17M c/s sometime. And all are long password candidates: ( 2 long in fmt_test ) Benchmarking: Mac OS X 10.7+ salted SHA-512 [CUDA]... DONE Many salts: 60531K c/s real, 61086K c/s virtual Only one salt: 13107K c/s real, 13107K c/s virtual Thanks! Myrice
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.