|
Message-ID: <50A8CC67.6090409@gmail.com> Date: Sun, 18 Nov 2012 12:54:15 +0100 From: buawig <buawig@...il.com> To: john-users@...ts.openwall.com Subject: Re: cracking passwords with a kerberos traffic dump [implementation confirmed to work] >> To add some figures for how big the slowdown actually is on my side: >> - 390 c/s (faster implementation with pw length limitation) >> - 220 c/s (>16 password length support PBKDF2 implementation) > > Don't forget that you can use all cores by enabling OMP in the Makefile. Yes the above numbers are for a single core. With OMP (8x) I get actually even lower performance 166 c/s for the faster PBKDF2 impl., but with MPI (8x) I reach 1390 c/s. > Just wait for magnum to do his OpenCL magic ;) Yes looking forward to it and I'm having some more ideas to reduce the effort to crack etype 18 which I will send in a separate email (new thread).
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.