|
Message-ID: <a82a919e0710021250s70253106g5b47f0e005f6e84b@mail.gmail.com> Date: Tue, 2 Oct 2007 20:50:45 +0100 From: "Larry Bonner" <larry.bonner1@...il.com> To: john-users@...ts.openwall.com Subject: Re: potential MySQL optimization yes, i saw some code you describe on masmforum which uses MMX, it was extremely fast in tests..The method you describe is something like 6x faster using 32-bit code than normal hashing, and a staggering 300x faster using CORE 2 SSE4 optimised assembly!! i've seen the 32-bit code implemented in a commercial password cracker i won't mention. now a days, the SHA1 hash is more popular though, but still an interesting attack you describe which could be applied to other hash algorithms. BR On 10/1/07, ByteRage <byterage@...oo.com> wrote: > Given the MySQL password hash function: > -- To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply to the automated confirmation request that will be sent to you.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.