MacMusic  |  PcMusic  |  440 Software  |  440 Forums  |  440TV  |  Zicos
ripper
Recherche

New John the Ripper Cracks Passwords On FPGAs

samedi 18 mai 2019, 20:41 , par Slashdot/Apple
Long-time Slashdot reader solardiz has long bring an advocate for bringing security to open environments. Wednesday he contacted Slashdot to share this update about a piece of software he's authored called John the Ripper:

John the Ripper is the oldest still evolving password cracker program (and Open Source project), first released in 1996. John the Ripper 1.9.0-jumbo-1, which has just been announced with a lengthy list of changes, is the first release to include FPGA support (in addition to CPU, GPU, and Xeon Phi). This is a long-awaited (or long-delayed) major release, encompassing 4.5 years of development and 6000+ commits by 80+ contributors. From the announcement:

'Added FPGA support for 7 hash types for ZTEX 1.15y boards we support: bcrypt, descrypt (including its bigcrypt extension), sha512crypt & Drupal7, sha256crypt, md5crypt (including its Apache apr1 and AIX smd5 variations) & phpass. As far as we're aware, several of these are implemented on FPGA for the very first time. For bcrypt, our ~119k c/s at cost 5 in ~27W greatly outperforms latest high-end GPUs per board, per dollar, and per Watt. We also support multi-board clusters (tested for up to 16 boards, thus 64 FPGAs, on a Raspberry Pi 2 host).'

Read more of this story at Slashdot.
rss.slashdot.org/~r/Slashdot/slashdot/~3/OgGAm8O8YZc/new-john-the-ripper-cracks-passwords-on-fpgas
News copyright owned by their original publishers | Copyright © 2004 - 2024 Zicos / 440Network
Date Actuelle
jeu. 28 mars - 10:33 CET