[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 2 Oct 2007 20:50:45 +0100
From: "Larry Bonner" <larry.bonner1@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: potential MySQL optimization
yes, i saw some code you describe on masmforum which uses MMX, it was
extremely fast in tests..The method you describe is something like 6x
faster using 32-bit code than normal hashing, and a staggering 300x
faster using CORE 2 SSE4 optimised assembly!!
i've seen the 32-bit code implemented in a commercial password cracker
i won't mention.
now a days, the SHA1 hash is more popular though, but still an
interesting attack you describe which could be applied to other hash
algorithms.
BR
On 10/1/07, ByteRage <byterage@...oo.com> wrote:
> Given the MySQL password hash function:
>
--
To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply
to the automated confirmation request that will be sent to you.
Powered by blists - more mailing lists
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ