Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <44F58E96.1030201@mail.ru>
Date: Wed, 30 Aug 2006 16:11:50 +0300
From: Pietari Kivikangas <JTR1998@...l.ru>
To:  john-users@...ts.openwall.com
Subject: Re: encryption strength vs. the time it takes to find
 the same password with different key sizes

John wrote:
> I am trying to better understand this, so please bare with me. Lets say I
> have two hashes I want to crack. Each hash uses the same password.     If
> one encryption is with 32 bit. and the other is 64 bit.  would 
> cracking the
> 64 bit encryption actually take longer?
It depends on the method used for cracking the hash as well as on the 
hashing method itself.
With John the Ripper this would only depend on the time required for 
calling the hash function. It is virtually possible to make an 
unoptimized version of a 32-bit hash function which would be much slower 
than a 64-bit one.
Other methods which are not covered by John the Ripper, would require a 
small cryptographical research to be implemented and of course a 32-bit 
hash would be crackable in a timely manner. That's why nowadays 
cryptographic functions of such bit strength are not used.


-- 
To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply
to the automated confirmation request that will be sent to you.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.