Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <a82a919e0710021250s70253106g5b47f0e005f6e84b@mail.gmail.com>
Date: Tue, 2 Oct 2007 20:50:45 +0100
From: "Larry Bonner" <larry.bonner1@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: potential MySQL optimization

yes, i saw some code you describe on masmforum which uses MMX, it was
extremely fast in tests..The method you describe is something like 6x
faster using 32-bit code than normal hashing, and a staggering 300x
faster using CORE 2 SSE4 optimised assembly!!

i've seen the 32-bit code implemented in a commercial password cracker
i won't mention.
now a days, the SHA1 hash is more popular though, but still an
interesting attack you describe which could be applied to other hash
algorithms.

BR

On 10/1/07, ByteRage <byterage@...oo.com> wrote:
> Given the MySQL password hash function:
>

-- 
To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply
to the automated confirmation request that will be sent to you.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.