|
Message-ID: <CA+EaD-aE562LpQoVFWC5WW9ET6kt2qDu0zu6UHtofShUhhedeQ@mail.gmail.com> Date: Fri, 16 Aug 2013 19:19:36 +0200 From: Katja Malvoni <kmalvoni@...il.com> To: john-dev@...ts.openwall.com Subject: Re: Parallella: bcrypt Hi Alexander, On Thu, Aug 15, 2013 at 1:39 AM, Solar Designer <solar@...nwall.com> wrote: > On Wed, Aug 14, 2013 at 11:28:11PM +0200, Katja Malvoni wrote: > > these are results of tests on both boards. 20 test cases (both boards > used > > the same set), 3000 random strings, 1000 hashes, each test takes 20 - 21 > > minutes. > > Does this mean that each system spent about 400 minutes on these? > Yes it does. > I suggest that you use a smaller wordlist and a smaller list of hashes - > e.g., 64 of each (with every word actually cracking a password) - and do > many more invocations. This will likely trigger the problem more > frequently (because more of the bcrypt computation results will actually > need to match a loaded hash). Maybe you'll trigger it on the "embecosm" > system too. > I tried this on both system. Results are attached. And it didn't trigger the problem... Only problem is occasional stall (lines with 0 cracked passwords). What should I do next? Katja Content of type "text/html" skipped Download attachment "embecosm" of type "application/octet-stream" (35000 bytes) Download attachment "zed" of type "application/octet-stream" (35000 bytes)
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.