Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20120523190706.GA30362@openwall.com>
Date: Wed, 23 May 2012 23:07:06 +0400
From: Solar Designer <solar@...nwall.com>
To: Brad Tilley <brad@...ystems.com>
Cc: john-dev@...ts.openwall.com
Subject: Re: Brute Force TrueCrypt Headers

On Fri, Apr 13, 2012 at 11:04:02PM -0400, Brad Tilley wrote:
> Here is my source code: http://16s.us/TCHead/downloads/
> 
> Here is the FAQ: http://16s.us/TCHead/faq/

Here's another implementation, including some CUDA code:

https://code.google.com/p/truecrack/

GPLv3, unfortunately.

I learned of this one from:

http://www.reddit.com/r/netsec/comments/u116n/truecrack_a_bruteforce_password_cracker_for/

The reported speed is only 15 passwords/second on a quad-core CPU.
Brad - how does this compare to your implementation's speed?

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.