|
Message-ID: <BAY107-F18C146F2E077875647D7F9FD7A0@phx.gbl> Date: Fri, 14 Oct 2005 00:20:31 +0200 From: "Frank Dittrich" <frank_dittrich@...mail.com> To: john-users@...ts.openwall.com Subject: Re: Using Hardwareaccelerators to speed up John Solar Designer wrote: >However, not all is lost. There are things which actually would work: > >1. General-purpose FPGA-based boards. These would need to be programmed >for the very specific task. I briefly evaluated this possibility back >in 1998-1999 and it appeared that FPGAs would deliver roughly 5 times >better DES performance for the money, compared against the most suitable >CPUs (at the time, that was Alpha 21164PC - affordable and really good >at bitslice DES). I used retail prices; the improvement could be a lot >better for large quantities. I think the technology has improved a lot. See http://www.ccc.de/congress/2004/fahrplan/event/244.en.html (IIRC, "basic functionality of john the ripper" merely implemented brute forcing a part of the key space. But it should also be possible to let john create the password candidates, and calculate (and compare) the hashes using FPGA hardware, using an order of magnitude larger MAX_KEYS_PER_CRYPT value than for general purpose CPUs.) Also have a look at the slides: http://www.ccc.de/congress/2004/fahrplan/files/340-fpga-slides.pdf David Hulton claimed you'd be able to "crack password hashes as fast as 100+ PCs using FPGA PCMCIA cards on your laptop". Regards, Frank
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.