Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20110627092518.GA5223@openwall.com>
Date: Mon, 27 Jun 2011 13:25:18 +0400
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: brute force attack of an Unix crypt

On Mon, Jun 27, 2011 at 12:03:23PM +0300, Martin T wrote:
> Bartavelle, I see. Now I understand what those "c/s" values are :) In
> order to try all possibilities, it would take 226 years:
> 
> (95^8)/930000/3600/24/365

Yes, assuming that you continue running the same highly non-optimal
build of JtR on the same machine.

> ..and thus in average password should be cracked with 113 years

This assumes that the password was based on a random number generator
with a uniform distribution, and using the entire printable US-ASCII
character set.  Both of these are likely not true.  So the average may
be much better.

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.