Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 23 May 2012 15:11:37 -0400 (EDT)
From: "Brad Tilley" <>
To: "Solar Designer" <>
Cc: "Brad Tilley" <>,
Subject: Re: Brute Force TrueCrypt Headers

> On Fri, Apr 13, 2012 at 11:04:02PM -0400, Brad Tilley wrote:
>> Here is my source code:
>> Here is the FAQ:
> Here's another implementation, including some CUDA code:
> GPLv3, unfortunately.
> I learned of this one from:
> The reported speed is only 15 passwords/second on a quad-core CPU.
> Brad - how does this compare to your implementation's speed?
> Alexander

Mine does about 50 passwords a second, but it's not optimized to crack
passwords. I have a bit in the FAQ about that:

A multi-threaded or multi-process attack should do more than that.


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.