|
Message-ID: <50D2084A.2080507@banquise.net> Date: Wed, 19 Dec 2012 19:32:42 +0100 From: Simon Marechal <simon@...quise.net> To: john-users@...ts.openwall.com Subject: Mangling rules for different ciphers Following my Passwords^12 presentation, I generated mangling rules for different ciphers. This is just a test, downloadable there: http://www.banquise.net/bin/2012-12-19-mangling.tar.bz2 It contains the following files: processWordlist - the time it takes (in seconds) to mangle a wordlist on my computer processtime - the time it takes (in seconds) to test a password against a single salt with DES on my computer And the results: result-des result-des-us result-fasthash result-fasthash-us result-slowhash result-slowhash-us Files finishing without -us have been trained with the new sraveau wikipedia wordlist, and rockyou. Those with a -us suffix have been generated using the new sraveau wikipedia wordlist, limited to the US keymap, and rockyou. The "des" files have been trained with the aforementioned parameters, the "fasthash" for the case where mangling the wordlist takes much more time than testing individual passwords, and "slowhash" for the case where testing a single password takes much more time than mangling the wordlist. It will probably need some fixing (removal of the performance values, and probably fixing the [ and ]), but should perform well. I will bench them ASAP. In the meanwhile, please let me know if this is useful to you.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.