Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 25 Jun 2015 14:26:56 -0400
From: Alain Espinosa <>
Subject: RE: precomputed attacks for john: rainbow tables and
 other ways

-------- Original message --------
From: Aleksey Cherepanov <> 
Date:06/25/2015 12:59 PM (GMT-05:00) 
Subject: [john-dev] precomputed attacks for john: rainbow tables and other ways 


Some weeks ago I research a little about rainbow tables. I need to research more. I will probably add support for Hash Suite in the near future. Some comments:

1- There are a lot of scientific research related to time - memory trade off, the majority unused. We need first to take a look at it and then develop new ideas. For example there are claims that Hellman tables with Distinguished Points are better than Rainbow tables. We can access papers from: . I recommend for example "Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-offs", 2008, Jin Hong, Kyung Chul Jeong and others.

2- 2^31 is too small. In a high end GPU we can exhaust the key space in 0.14 second for NTLM hashes or 0.25 for MD5. Yes, less than one second.

3- One thing worth investigating is mix rainbow tables with John incremental or Markov mode, so we had a small rainbow table with the more probable candidates. We need to ensure the probability of repetitions remains low, but this is interesting, particularly for high password lengths where full rainbow tables are to big.

Content of type "text/html" skipped

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.