Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 8 Jul 2012 07:58:06 +0530
From: Sayantan Datta <std2048@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: optimized mscash2-opencl

On Sun, Jul 8, 2012 at 1:32 AM, Frank Dittrich
<frank_dittrich@...mail.com>wrote:

> On 07/07/2012 11:48 AM, Solar Designer wrote:
> > I did not check for possible false negatives.  Someone will need to run
> > the test suite.
> >
> > Also notice how we stayed within the same "bara - choedia" set of
> > candidate passwords for half an hour.  It'd take roughly:
> >
> > 262144*1090/102413 = 2790 seconds
>
> For the test suite, we also need to make sure the number of passwords in
> the (possibly format specific) pw.dic is higher than MAX_KEYS_PER_CRYPT
> (here: 262144), possibly even higher than 2*MAX_KEYS_PER_CRYPT.
> Otherwise we will miss several sorts of possible bugs.
>
> Frank
>
>
Changing the MAX_KEYS_PER_CRYPT to 1/2x or even 1/4x has minor impact on
performance. Performance decrease is less than 1% and 2% for 1/2 and 1/4th
MAX_KEYS_PER_CRYPT respectively.

Sayantan

[ CONTENT OF TYPE text/html SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ