> > IIRC 200/s on a 2.8GHz P4 > > I discussed improving nasty with an unnamed gpg-expert and he thought it > > should be feasable to do at least a million per second. But as nasty is > > a proof of concept I can't get myself motivated to improve it. > The password hashing is supposed to make it *difficult* to crack > passphrases, because of the computational cost! > Don't find a fast way to break them and force us all to use 200 > character passphrases!
Apart from the fact that this is (more or less) security by obscurity even if my program would be a million times faster, 7 characters still would take a day. Folkert van Heusden -- Auto te koop, zie: http://www.vanheusden.com/daihatsu.php -------------------------------------------------------------------- Get your PGP/GPG key signed at www.biglumber.com! -------------------------------------------------------------------- Phone: +31-6-41278122, PGP-key: 1F28D8AE _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users