|
Message-ID: <85cca489102c4585318a07a035301045@smtp.hushmail.com> Date: Sun, 13 Sep 2015 17:57:10 +0200 From: magnum <john.magnum@...hmail.com> To: john-dev@...ts.openwall.com Subject: Re: experiment with functions to reject computed hashes On 2015-09-13 15:06, Solar Designer wrote: > I think most speedup when cracking few hashes is possible through > reversing of steps, which we're not doing yet. Yes we are, since a couple of months. $ git grep -l SSEi_REVERSE_STEPS *fmt*c mssql-old_fmt_plug.c mssql05_fmt_plug.c mssql12_fmt_plug.c nt2_fmt_plug.c rawMD4_fmt_plug.c rawMD5_fmt_plug.c rawSHA1_fmt_plug.c rawSHA224_fmt_plug.c rawSHA256_fmt_plug.c rawSHA384_fmt_plug.c rawSHA512_fmt_plug.c I mostly just put the mechanism in there, more can be done - especially for SHA-2 which currently only skip the final constant addition. magnum
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.