Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 20 Dec 2012 02:56:12 +0100
From: newangels newangels <>
Subject: Re: Mangling rules for different ciphers

Thank you really appreciated,



2012/12/19, Simon Marechal <>:
> Following my Passwords^12 presentation, I generated mangling rules for
> different ciphers. This is just a test, downloadable there:
> It contains the following files:
> processWordlist - the time it takes (in seconds) to mangle a wordlist on
> my computer
> processtime - the time it takes (in seconds) to test a password against
> a single salt with DES on my computer
> And the results:
> result-des
> result-des-us
> result-fasthash
> result-fasthash-us
> result-slowhash
> result-slowhash-us
> Files finishing without -us have been trained with the new sraveau
> wikipedia wordlist, and rockyou. Those with a -us suffix have been
> generated using the new sraveau wikipedia wordlist, limited to the US
> keymap, and rockyou.
> The "des" files have been trained with the aforementioned parameters,
> the "fasthash" for the case where mangling the wordlist takes much more
> time than testing individual passwords, and "slowhash" for the case
> where testing a single password takes much more time than mangling the
> wordlist.
> It will probably need some fixing (removal of the performance values,
> and probably fixing the [ and ]), but should perform well. I will bench
> them ASAP. In the meanwhile, please let me know if this is useful to you.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.