Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 24 Feb 2011 09:33:45 -0500
From: Rich Rumble <richrumble@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: Checks per second and LM

On Thu, Feb 24, 2011 at 8:32 AM, Nahuel Grisolía
<nahuel.grisolia@...il.com> wrote:
> List, for example I've got:
>
> guesses: 3581  time: 0:16:15:31 (3)  c/s: 5385M  trying: -5O_5O% - -5O_5A!
>
> And then, being helped by the WIKI page for LM hash, it states that the key
> space for each half is 2^43=8796093022208. So... If I've got
> 5385M=5385000000 checks per sec, 8796093022208/5385000000 = 28 min total
> time for entire key space... What i'm missing here? I think this is not
> correct...
>From the FAQ http://www.openwall.com/john/doc/FAQ.shtml
Q: Why does John display meaningless c/s values while cracking,
instead of real "crypts per second" rate?
A: The values displayed by John mean combinations (of username and
password) per second, not crypts per second. This is the effective
cracking speed that you get on a particular set of password hashes,
and it may be useful, for example, to tune the "--salts=..." threshold
and other settings. If you want a benchmark of the low-level password
hashing routines only, use "--test". (Future versions of John the
Ripper might report effective and raw c/s rates for different time
intervals. These won't fit on the current status line, though.)

Powered by blists - more mailing lists

Your e-mail address:

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.