Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <45656.128.173.192.90.1337800631.squirrel@webmail.tuffmail.net>
Date: Wed, 23 May 2012 15:17:11 -0400 (EDT)
From: "Brad Tilley" <brad@...ystems.com>
To: "Solar Designer" <solar@...nwall.com>
Cc: "Brad Tilley" <brad@...ystems.com>,
 john-dev@...ts.openwall.com
Subject: Re: Brute Force TrueCrypt Headers

> On Fri, Apr 13, 2012 at 11:04:02PM -0400, Brad Tilley wrote:
>> Here is my source code: http://16s.us/TCHead/downloads/
>>
>> Here is the FAQ: http://16s.us/TCHead/faq/
>
> Here's another implementation, including some CUDA code:
>
> https://code.google.com/p/truecrack/
>
> GPLv3, unfortunately.
>
> I learned of this one from:
>
> http://www.reddit.com/r/netsec/comments/u116n/truecrack_a_bruteforce_password_cracker_for/
>
> The reported speed is only 15 passwords/second on a quad-core CPU.
> Brad - how does this compare to your implementation's speed?
>
> Alexander


Also, I forgot to add that my code is GPLv3 as well. I don't suspect
you'll use it, but feel free if you like. If you want to use it and the
license is a problem, I can provide a BSD license to the JTR project.

My code is mostly meant as a proof of concept and for demonstration
purposes thus it is unlikely to be very useful when performance is a
paramount concern.

Brad


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.