Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <49783B15.7040002@banquise.net>
Date: Thu, 22 Jan 2009 10:23:33 +0100
From: bartavelle@...quise.net
To: john-users@...ts.openwall.com
Subject: Re: keyspace, mask password and dumb bruteforce

Steve Bergman a écrit :
> I'm no expert. But it seems to me that this is a problem where a little 
> finesse is worth more than one *hell* of a lot of brute force.

Actually I did a bit of research on this. It is true that in most cases, 
finesse is a lot better than brute force, even when running 10 times 
slower. However, once you have the weak passwords cracked, I know of no 
known password selection algorithm that has a significant advantage over 
brute force (at least with my test data).

This means that for moderately strong passwords, brute force is often 
better, because it is just faster, and easy to distribute. However, the 
probability that you crack this password remains low in all cases.

-- 
To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply
to the automated confirmation request that will be sent to you.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.