|
Message-ID: <44F58E96.1030201@mail.ru> Date: Wed, 30 Aug 2006 16:11:50 +0300 From: Pietari Kivikangas <JTR1998@...l.ru> To: john-users@...ts.openwall.com Subject: Re: encryption strength vs. the time it takes to find the same password with different key sizes John wrote: > I am trying to better understand this, so please bare with me. Lets say I > have two hashes I want to crack. Each hash uses the same password. If > one encryption is with 32 bit. and the other is 64 bit. would > cracking the > 64 bit encryption actually take longer? It depends on the method used for cracking the hash as well as on the hashing method itself. With John the Ripper this would only depend on the time required for calling the hash function. It is virtually possible to make an unoptimized version of a 32-bit hash function which would be much slower than a 64-bit one. Other methods which are not covered by John the Ripper, would require a small cryptographical research to be implemented and of course a 32-bit hash would be crackable in a timely manner. That's why nowadays cryptographic functions of such bit strength are not used. -- To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply to the automated confirmation request that will be sent to you.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.