Encryption over Hidden Services
Robert Ransom
rransom.8774 at gmail.com
Fri Aug 6 23:28:41 UTC 2010
On Fri, 6 Aug 2010 11:28:15 -0700
coderman <coderman at gmail.com> wrote:
> On Fri, Aug 6, 2010 at 6:00 AM, Robert Ransom <rransom.8774 at gmail.com> wrote:
> > ...
> > | On my 1.5GHz x86-machine, I get about 500k hashes/sec.
> > | +---------------------------------------------+
> > | | chars | ~number of tries | ~time @ 500 KH/s |
> > [snip]
> > | | 6 | 32^6 = 1g | 30 min |
> > | | 7 | 32^7 = 32g | 1 day |
> > | | 8 | 32^8 = 1t | 25 days |
> > | | 9 | 32^9 = 32t | 2.5 years |
>
> to throw in my $0.02, this is quite low for any kind of on-demand
> computing resource within the same league of difficulty. at $200 you
> can get grid/cloud compute time on the order of 200B hashes/hour (160
> cores, 160 G memory) for 3-4 hours. and getting cheaper every day...
Good point. Also, the README lists a few optimizations that would make
it go even faster (most notably, converting the user-provided regex for
the base32-encoded hash to something that the binary hash can be
efficiently compared to).
Robert Ransom
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 198 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20100806/4ee7b2e7/attachment.pgp>
More information about the tor-dev
mailing list