Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 2 Oct 2007 20:50:45 +0100
From: "Larry Bonner" <larry.bonner1@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: potential MySQL optimization

yes, i saw some code you describe on masmforum which uses MMX, it was
extremely fast in tests..The method you describe is something like 6x
faster using 32-bit code than normal hashing, and a staggering 300x
faster using CORE 2 SSE4 optimised assembly!!

i've seen the 32-bit code implemented in a commercial password cracker
i won't mention.
now a days, the SHA1 hash is more popular though, but still an
interesting attack you describe which could be applied to other hash
algorithms.

BR

On 10/1/07, ByteRage <byterage@...oo.com> wrote:
> Given the MySQL password hash function:
>

-- 
To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply
to the automated confirmation request that will be sent to you.

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ