|
Message-ID: <CANO7a6xyWV7+Q57nV5oN_WwD-HHXv--HsY=zVS-7-N_2woB9YQ@mail.gmail.com> Date: Wed, 31 Oct 2012 20:12:07 +0530 From: Dhiru Kholia <dhiru.kholia@...il.com> To: john-dev@...ts.openwall.com Subject: Re: new fastssh format, please test and review On Mon, Oct 29, 2012 at 8:44 PM, Dhiru Kholia <dhiru.kholia@...il.com> wrote: > By using the attached fastssh format, it is possible to get > 3X > speedup over existing code (speedup is currently only for AES-128-CBC > encrypted keys which are default these days on many systems). I have now also accelerated cracking of keys which use 3DES encryption (using same trick as used in AES). Initial benchmarks were a bit conservative, new figures, > 5X speedup for keys using 3DES encryption > 4X speedup for keys using AES-128 encryption (OMP results on AMD X3 720) So far, I haven't been able to find false positives (although they can occur) using the attached code. It also cracks all CMIYC and ssh-key-collection.tar.bz2 files with no problems. -- Cheers, Dhiru View attachment "fastssh_fmt_plug.c" of type "text/x-csrc" (20460 bytes) Download attachment "fastssh2john.py" of type "application/octet-stream" (27032 bytes)
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.