From owner-freebsd-chat Fri Feb 28 20:05:41 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id UAA07682 for chat-outgoing; Fri, 28 Feb 1997 20:05:41 -0800 (PST) Received: from rah.star-gate.com (rah.star-gate.com [204.188.121.18]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id UAA07677 for ; Fri, 28 Feb 1997 20:05:38 -0800 (PST) Received: from rah.star-gate.com (localhost.star-gate.com [127.0.0.1]) by rah.star-gate.com (8.8.5/8.7.3) with ESMTP id UAA13405; Fri, 28 Feb 1997 20:05:43 -0800 (PST) Message-Id: <199703010405.UAA13405@rah.star-gate.com> X-Mailer: exmh version 1.6.9 8/22/96 To: Brian Tao cc: FREEBSD-CHAT-L Subject: Re: RSA 56-bit key challenge In-reply-to: Your message of "Fri, 28 Feb 1997 22:59:05 EST." Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Date: Fri, 28 Feb 1997 20:05:43 -0800 From: Amancio Hasty Sender: owner-chat@freebsd.org X-Loop: FreeBSD.org Precedence: bulk >From The Desk Of Brian Tao : > On Fri, 28 Feb 1997, Amancio Hasty wrote: > > > > {hasty} ./rc5-client-freebsd -m > > rc5-56-client: Performance testing with 1000000 crypts > > rc5-56-client: Complete in 3.347 seconds. (298812.07 keys/sec) > > > > The result looks to fast for me 8) > > > > So the next question am I am running the reference benchmark correctly? > > That looks right to me. If you're not affiliated with any team > yet, wanna join ours? :) We're rsacrack@vex.net... a late start, but > we're moving up pretty quickly. :) With pleasure 8) {hasty} ./rc5-client-freebsd -i rsacrack@vex.net rc5-56-client: Obtaining Key Mask from ``zero.genx.net:2056''. rc5-56-client: New Media Laboratories, RC5 Key Server rc5-56-client: Received Keyspace Mask 0x0000000FFFFFFF rc5-56-client: Start Key 0x6A087CC0000000, trying 268435456 keys. Cheers, Amancio > -- > Brian Tao (BT300, taob@risc.org) > "Though this be madness, yet there is method in't" >