> > IIRC 200/s on a 2.8GHz P4
> > I discussed improving nasty with an unnamed gpg-expert and he thought it
> > should be feasable to do at least a million per second. But as nasty is
> > a proof of concept I can't get myself motivated to improve it.
> The password hashing is supposed to make it *difficult* to crack
> passphrases, because of the computational cost!
> Don't find a fast way to break them and force us all to use 200
> character passphrases!

Apart from the fact that this is (more or less) security by obscurity
even if my program would be a million times faster, 7 characters still
would take a day.


Folkert van Heusden

-- 
Auto te koop, zie: http://www.vanheusden.com/daihatsu.php
--------------------------------------------------------------------
Get your PGP/GPG key signed at www.biglumber.com!
--------------------------------------------------------------------
Phone: +31-6-41278122, PGP-key: 1F28D8AE

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to