Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CA+EaD-aE562LpQoVFWC5WW9ET6kt2qDu0zu6UHtofShUhhedeQ@mail.gmail.com>
Date: Fri, 16 Aug 2013 19:19:36 +0200
From: Katja Malvoni <kmalvoni@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: Parallella: bcrypt

Hi Alexander,

On Thu, Aug 15, 2013 at 1:39 AM, Solar Designer <solar@...nwall.com> wrote:

> On Wed, Aug 14, 2013 at 11:28:11PM +0200, Katja Malvoni wrote:
> > these are results of tests on both boards. 20 test cases (both boards
> used
> > the same set), 3000 random strings, 1000 hashes, each test takes 20 - 21
> > minutes.
>
> Does this mean that each system spent about 400 minutes on these?
>

Yes it does.


> I suggest that you use a smaller wordlist and a smaller list of hashes -
> e.g., 64 of each (with every word actually cracking a password) - and do
> many more invocations.  This will likely trigger the problem more
> frequently (because more of the bcrypt computation results will actually
> need to match a loaded hash).  Maybe you'll trigger it on the "embecosm"
> system too.
>

I tried this on both system. Results are attached. And it didn't trigger
the problem... Only problem is occasional stall (lines with 0 cracked
passwords).
What should I do next?

Katja

Content of type "text/html" skipped

Download attachment "embecosm" of type "application/octet-stream" (35000 bytes)

Download attachment "zed" of type "application/octet-stream" (35000 bytes)

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.