Forgot your password?
typodupeerror
AMD

+ - John the Ripper Cracks Slow Hashes On GPU-> 1

Submitted by
solardiz
solardiz writes "New community-enhanced version of John the Ripper adds support for GPUs via CUDA and OpenCL, currently focusing on slow to compute hashes and ciphers such as Fedora's and Ubuntu's sha512crypt, OpenBSD's bcrypt, encrypted RAR archives, WiFi WPA-PSK. A 5 times speedup over AMD FX-8120 CPU per-chip is achieved for sha512crypt on NVIDIA GTX 570, whereas bcrypt barely reaches the CPU's speed on AMD Radeon HD 7970 (a high-end GPU). This result reaffirms that bcrypt is a better current choice than sha512crypt (let alone sha256crypt) for operating systems, applications, and websites to move to, unless they already use one of these "slow" hashes and until a newer/future password hashing method such as one based on the sequential memory-hard functions concept is ready to move to.

The same John the Ripper release also happens to add support for cracking of many additional and diverse hash types ranging from IBM RACF's as used on mainframes to Russian GOST and to Drupal 7's as used on popular websites — just to give a few examples — as well as support for Mac OS X keychains, KeePass and Password Safe databases, Office 2007/2010 and ODF documents, Firefox/Thunderbird/SeaMonkey master passwords, more RAR archive kinds, WPA-PSK, VNC and SIP authentication, and it makes greater use of AMD Bulldozer's XOP extensions."

Link to Original Source
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

John the Ripper Cracks Slow Hashes On GPU

Comments Filter:

PLUG IT IN!!!

Working...