Encryption over Hidden Services

Robert Ransom rransom.8774 at gmail.com
Fri Aug 6 23:28:41 UTC 2010


On Fri, 6 Aug 2010 11:28:15 -0700
coderman <coderman at gmail.com> wrote:

> On Fri, Aug 6, 2010 at 6:00 AM, Robert Ransom <rransom.8774 at gmail.com> wrote:
> > ...
> > | On my 1.5GHz x86-machine, I get about 500k hashes/sec.
> > | +---------------------------------------------+
> > | | chars | ~number of tries | ~time @ 500 KH/s |
> >  [snip]
> > | |     6 |      32^6  =  1g |           30 min |
> > | |     7 |      32^7  = 32g |            1 day |
> > | |     8 |      32^8  =  1t |          25 days |
> > | |     9 |      32^9  = 32t |        2.5 years |
> 
> to throw in my $0.02, this is quite low for any kind of on-demand
> computing resource within the same league of difficulty. at $200 you
> can get grid/cloud compute time on the order of 200B hashes/hour (160
> cores, 160 G memory) for 3-4 hours. and getting cheaper every day...

Good point.  Also, the README lists a few optimizations that would make
it go even faster (most notably, converting the user-provided regex for
the base32-encoded hash to something that the binary hash can be
efficiently compared to).

Robert Ransom
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 198 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20100806/4ee7b2e7/attachment.pgp>


More information about the tor-dev mailing list