|
Message-ID: <20110627092518.GA5223@openwall.com> Date: Mon, 27 Jun 2011 13:25:18 +0400 From: Solar Designer <solar@...nwall.com> To: john-users@...ts.openwall.com Subject: Re: brute force attack of an Unix crypt On Mon, Jun 27, 2011 at 12:03:23PM +0300, Martin T wrote: > Bartavelle, I see. Now I understand what those "c/s" values are :) In > order to try all possibilities, it would take 226 years: > > (95^8)/930000/3600/24/365 Yes, assuming that you continue running the same highly non-optimal build of JtR on the same machine. > ..and thus in average password should be cracked with 113 years This assumes that the password was based on a random number generator with a uniform distribution, and using the entire printable US-ASCII character set. Both of these are likely not true. So the average may be much better. Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.