Hi

On Monday 18 April 2011 00:58:13 Robert J. Hansen wrote:
> 
> His math doesn't work.  I call shenanigans on the entire thing.

I'd like to add a F-ACK to that statement, out of curiosity I tried cracking 
"J4fS<2" with CUDA multiforcer and it took less than 15 minutes on a single 
GF200 class card (the program tells me that it did about 490 million MD5 
hashes per second)...

With that I'd estimate everything below 9 or 10 characters based on a random 
combination of these characters should be considered broken or very likely to 
be broken: 
 
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~

I'm currently running the "quick brown fox" using a dictionary "attack" (also 
salted MD5 based), but that is usually only successful, if the correct 
combination rules are being considered...

Just my inflationary €0.023

Cheers

Carsten

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to