Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20100307201047.GA11320@openwall.com>
Date: Sun, 7 Mar 2010 23:10:47 +0300
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: Time/speed cracking table

On Sun, Mar 07, 2010 at 08:28:52PM +0100, websiteaccess@...il.com wrote:
>  Interesting link with time/speed cracking.
> 
> http://www.lockdown.co.uk/?pg=combi&s=articles#

These tables give worst case times only.  Actual times will be a lot
lower - typically several orders of magnitude lower for human-chosen
passwords - because the probabilities of individual characters are not
equal and are not independent.

Also, attacking multiple target password hashes at once may result in
much shorter average time period between successful guesses.  It depends
on the use of salts or lack thereof.

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.