|
Message-ID: <AANLkTikLkDUHNS5LFYz2hP62Oikk57gxMjvjVrf4qK0W@mail.gmail.com> Date: Thu, 24 Feb 2011 09:33:45 -0500 From: Rich Rumble <richrumble@...il.com> To: john-users@...ts.openwall.com Subject: Re: Checks per second and LM On Thu, Feb 24, 2011 at 8:32 AM, Nahuel Grisolía <nahuel.grisolia@...il.com> wrote: > List, for example I've got: > > guesses: 3581 time: 0:16:15:31 (3) c/s: 5385M trying: -5O_5O% - -5O_5A! > > And then, being helped by the WIKI page for LM hash, it states that the key > space for each half is 2^43=8796093022208. So... If I've got > 5385M=5385000000 checks per sec, 8796093022208/5385000000 = 28 min total > time for entire key space... What i'm missing here? I think this is not > correct... >From the FAQ http://www.openwall.com/john/doc/FAQ.shtml Q: Why does John display meaningless c/s values while cracking, instead of real "crypts per second" rate? A: The values displayed by John mean combinations (of username and password) per second, not crypts per second. This is the effective cracking speed that you get on a particular set of password hashes, and it may be useful, for example, to tune the "--salts=..." threshold and other settings. If you want a benchmark of the low-level password hashing routines only, use "--test". (Future versions of John the Ripper might report effective and raw c/s rates for different time intervals. These won't fit on the current status line, though.)
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.