Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <929885233e00e024ca2fc382edcb0a5c@smtp.hushmail.com>
Date: Tue, 4 Dec 2012 12:26:19 +0100
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: krb-ng format and krbng2john.py

On 3 Dec, 2012, at 22:17 , magnum <john.magnum@...hmail.com> wrote:
> I tried the known-plain trick with krb5ng but it doesn't do much here, only some 2% gain compared to the 60% boost for rc4-hmac mskrb5. With an OpenCL implementation it's probably not worth it at all. So I won't commit it, it's better to have text book code for now. Hm, or maybe I can use in a more straight-forward way to just short-cut crypt_all() when possible.

Did so, along with a number of other minor optimisations that almost don't show in benchmarking. More importantly I dropped the compile-time choice for PBKDF2 so we now always use the fast PBKDF2 for passwords up to 16 characters, and the slower function for longer passwords.

magnum

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.