|
Message-ID: <20120523190706.GA30362@openwall.com> Date: Wed, 23 May 2012 23:07:06 +0400 From: Solar Designer <solar@...nwall.com> To: Brad Tilley <brad@...ystems.com> Cc: john-dev@...ts.openwall.com Subject: Re: Brute Force TrueCrypt Headers On Fri, Apr 13, 2012 at 11:04:02PM -0400, Brad Tilley wrote: > Here is my source code: http://16s.us/TCHead/downloads/ > > Here is the FAQ: http://16s.us/TCHead/faq/ Here's another implementation, including some CUDA code: https://code.google.com/p/truecrack/ GPLv3, unfortunately. I learned of this one from: http://www.reddit.com/r/netsec/comments/u116n/truecrack_a_bruteforce_password_cracker_for/ The reported speed is only 15 passwords/second on a quad-core CPU. Brad - how does this compare to your implementation's speed? Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.