|
Message-ID: <CA+EaD-Y3oZAv2y9e8tP4379sqECiJh6kGA=RY5bZO4FapAnHUQ@mail.gmail.com>
Date: Tue, 16 Jul 2013 15:12:02 +0200
From: Katja Malvoni <kmalvoni@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: Parallella: bcrypt
Hi Alexander,
On Tue, Jul 16, 2013 at 1:04 PM, Solar Designer <solar@...nwall.com> wrote:
> That's great news. What speed are you getting now?
>
> Can you also test using password.lst and
> http://openwall.info/wiki/_media/john/pw-fake-unix.gz from
> http://openwall.info/wiki/john/sample-hashes ? Since password.lst
> changed since that file was generated, not all hashes should get cracked -
> please test on your desktop system first to know what the right number
> of successful guesses is.
>
Self test - 822 c/s, with password.lst and pw-fake-unix 01:49:18, 820.9
c/s, 3059 password hashes cracked, 9531 left (Loaded 3107 password hashes
with 3107 different salts)
My desktop speed is 414 c/s so it won't be done soon, now it's at 34 %.
Katja
Content of type "text/html" skipped
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.