Date: Fri, 28 Feb 1997 20:05:43 -0800 From: Amancio Hasty <hasty@rah.star-gate.com> To: Brian Tao <taob@risc.org> Cc: FREEBSD-CHAT-L <freebsd-chat@freebsd.org> Subject: Re: RSA 56-bit key challenge Message-ID: <199703010405.UAA13405@rah.star-gate.com> In-Reply-To: Your message of "Fri, 28 Feb 1997 22:59:05 EST." <Pine.BSF.3.95.970228225716.7982C-100000@alpha.risc.org>
next in thread | previous in thread | raw e-mail | index | archive | help
>From The Desk Of Brian Tao :
> On Fri, 28 Feb 1997, Amancio Hasty wrote:
> >
> > {hasty} ./rc5-client-freebsd -m
> > rc5-56-client: Performance testing with 1000000 crypts
> > rc5-56-client: Complete in 3.347 seconds. (298812.07 keys/sec)
> >
> > The result looks to fast for me 8)
> >
> > So the next question am I am running the reference benchmark correctly?
>
> That looks right to me. If you're not affiliated with any team
> yet, wanna join ours? :) We're rsacrack@vex.net... a late start, but
> we're moving up pretty quickly. :)
With pleasure 8)
{hasty} ./rc5-client-freebsd -i rsacrack@vex.net
rc5-56-client: Obtaining Key Mask from ``zero.genx.net:2056''.
rc5-56-client: New Media Laboratories, RC5 Key Server
rc5-56-client: Received Keyspace Mask 0x0000000FFFFFFF
rc5-56-client: Start Key 0x6A087CC0000000, trying 268435456 keys.
Cheers,
Amancio
> --
> Brian Tao (BT300, taob@risc.org)
> "Though this be madness, yet there is method in't"
>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199703010405.UAA13405>
