|
Message-ID: <20120715172503.GA18784@openwall.com> Date: Sun, 15 Jul 2012 21:25:03 +0400 From: Solar Designer <solar@...nwall.com> To: john-dev@...ts.openwall.com Subject: Re: xsha512-cuda & xsha512-opencl testing myrice - On Mon, Jul 09, 2012 at 07:41:02AM +0400, Solar Designer wrote: > Can you please start testing these formats with the following kinds of > test files (generate them first): > > 1 hash (and thus 1 salt) > 100 hashes, 100 salts > 10000 hashes, 10000 salts > 10000 hashes, 100 salts (100 hashes per salt) > 10000 hashes, 1 salt (10000 hashes per salt) > 1000000 hashes, 1000000 salts > 1000000 hashes, 1000 salts (1000 hashes per salt) > 1000000 hashes, 1 salt > > No need to test single crack mode (we know it'll behave poorly), but > with e.g. -i=all8 it should be possible to get all of these to run > faster than CPU. Note that JtR reports "effective" c/s rate while > cracking - that is, combinations of {candidate password, target hash} > tried per second. So for 1M hashes with just 1 salt, you should see a > huge figure there (like "50000G" if you get this to run optimally, which > might not be easy). (Yes, I need to improve reporting to include raw > c/s rate as well.) Thank you for working on this. I notice that you're running the tests in wordlist mode. This is fine for correctness testing, but not for benchmarking, where it adds a bottleneck. I suggest that you use -i=All8 instead - and interrupt after a few minutes. You'll look at the c/s rate then. The test hashes should be such that no password will get cracked during these runs (well, or very few, not affecting the speed significantly). Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.