Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 16 Jul 2012 16:10:01 +0800
From: myrice <qqlddg@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: xsha512-cuda & xsha512-opencl testing

On Mon, Jul 9, 2012 at 11:41 AM, Solar Designer <solar@...nwall.com> wrote:
> myrice -
>
> Can you please start testing these formats with the following kinds of
> test files (generate them first):
>
> 1 hash (and thus 1 salt)
> 100 hashes, 100 salts
> 10000 hashes, 10000 salts
> 10000 hashes, 100 salts (100 hashes per salt)
> 10000 hashes, 1 salt (10000 hashes per salt)
> 1000000 hashes, 1000000 salts
> 1000000 hashes, 1000 salts (1000 hashes per salt)
> 1000000 hashes, 1 salt
>

Unfortunately, after lukas's work on bull, I cannot run my cuda format on it...

This is result under xsha512-opencl with incremental mode.

Incremental mode on xsha512-opencl with 7970:
HashNum_SaltNum
1_1
guesses: 1  time: 0:00:00:06 DONE (Mon Jul 16 10:54:39 2012)  c/s: 12838K

100_100
guesses: 6  time: 0:00:06:45 0.00%  c/s: 48827K

10K_10K
guesses: 89  time: 0:00:03:00 0.00%  c/s: 49944K

10K_100
guesses: 279  time: 0:00:05:40 0.00%  c/s: 2871M

10K_1
guesses: 5351  time: 0:00:03:43 0.00%  c/s: 72953M

1M_1
guesses: 47731  time: 0:00:03:56 0.00%  c/s: 2707G

1M_1K
guesses: 4196  time: 0:00:04:41 0.00%  c/s: 21220M

1M_1M
guesses: 50  time: 0:00:04:02 0.00%  c/s: 51453K

Only problem here is my passwords are too simple. I am generating
password length longer than 9 and will test it again.

Thanks
myrice

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ