我只是好奇为什么蛮力在Whirlpool散列上花费的时间比其他的要长得多,如下所示:
Passcovery Suite Version 3.50 build 3653 x64
Benchmark
CPU [Intel(R) Core(TM) i3-5020U CPU @ 2.20GHz]
Type: Microsoft® Word 2007
Protection: MS Office 2007, SHA1, 256-bit AES
Password recovery rate: 427 (453)
Type: OpenOffice v1.1
Protection: OpenOffice, PBKDF2/SHA1, 128-bit Blowfish
Password recovery rate: 10,654 (10,801)
Type: Blackberry 5.x backup
Protection: BlackBerry 5.x backup, PBKDF2/AES
Password recovery rate: 2,072,277 (2,082,185)
Type: WPA Handshake
Protection: WPA-PSK, PBKDF2/SHA1 HMAC/SHA1
Password recovery rate: 1,894 (1,900)
Type: RAR 3.x
Protection: RAR 3.x, SHA1, 128-bit AES
Password recovery rate: 383 (387)
Type: ZIP/Classic
Protection: ZIP proprietary algorithm, 96-bit
Password recovery rate: 26,890,751 (27,047,441)
Type: WinZip/AES
Protection: WinZip/AES, PBKDF2/SHA1, 256-bit AES
Password recovery rate: 12,891 (14,411)
Type: TrueCrypt volume
Protection: TrueCrypt volume header, PBKDF2/SHA-512/AES
Password recovery rate: 2,459 (2,476)
Type: TrueCrypt volume
Protection: TrueCrypt volume header, PBKDF2/RIPEMD-160/AES
Password recovery rate: 617 (627)
Type: TrueCrypt volume
Protection: TrueCrypt volume header, PBKDF2/Whirlpool/AES
Password recovery rate: 295 (302)
Type: Microsoft® Word 97
Protection: MS Office 97-2000, MD5, 40-bit RC4
Password recovery rate: 1,710,477 (1,703,046)
Type: Microsoft® Word 2003
Protection: MS Office XP-2003, SHA1, 128-bit RC4
Password recovery rate: 1,604,502 (1,602,161)
Type: Adobe® PDF
Protection: PDF /R 3, MD5, 128-bit RC4/AES
Password recovery rate: 125,753 (124,652)
Type: Adobe® PDF
Protection: PDF /R 6, SHA-256/384/512, 256-bit AES
Password recovery rate: 561 (563)
CPU frequency measured: 2195 Mhz
Raw results: 427, 10654, 2072277, 1894, 383, 26890751, 12891, 2459, 617, 295, 1710477, 1604502, 125753, 561此外,还有一个问题:
我能用GPU来恢复密码(20+字符)的速度有多快呢?我对密码一无所知(我上次使用它已经好多年了)?
发布于 2018-01-05 12:57:10
我能用gpu来恢复密码(20+字符)的速度有多快呢?我对密码一无所知(我上次使用它已经好多年了)?
根据这个基准,V100 (商业上最好的GPU )将在特定模式下达到94在/S上(在该页面上搜索6231 )。大约是您的CPU的300倍,当然您可以使用多个GPU。例如,在Amazon的云服务上,每个VM最多可以拥有8个这样的GPU。
但是请注意,如果您确实使用了随机的20+字符密码,那么至少有$2^{94}$可能的密码(如果您只使用了20个小写字符),并且测试此数量的密码是不可行的(并且需要$2^{77}$ GPU-years)。
我只是好奇为什么野蛮人在漩涡上比其他人花的时间长得多
这很难回答。这可能是因为在优化Whirlpool实现方面并没有投入大量的精力,因为它是一个很少见过的散列函数。可能是惠而浦显然需要大量的表查找,与适合其他哈希函数的寄存器相比,减慢了操作的速度。
https://crypto.stackexchange.com/questions/54478
复制相似问题