Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 28 Feb 1997 20:05:43 -0800
From:      Amancio Hasty <hasty@rah.star-gate.com>
To:        Brian Tao <taob@risc.org>
Cc:        FREEBSD-CHAT-L <freebsd-chat@freebsd.org>
Subject:   Re: RSA 56-bit key challenge 
Message-ID:  <199703010405.UAA13405@rah.star-gate.com>
In-Reply-To: Your message of "Fri, 28 Feb 1997 22:59:05 EST." <Pine.BSF.3.95.970228225716.7982C-100000@alpha.risc.org> 

next in thread | previous in thread | raw e-mail | index | archive | help
>From The Desk Of Brian Tao :
> On Fri, 28 Feb 1997, Amancio Hasty wrote:
> >
> > {hasty} ./rc5-client-freebsd -m
> > rc5-56-client: Performance testing with 1000000 crypts
> > rc5-56-client: Complete in 3.347 seconds. (298812.07 keys/sec)
> > 
> > The result looks to fast for me 8)
> > 
> > So the next question am I am running the reference benchmark correctly?
> 
>     That looks right to me.  If you're not affiliated with any team
> yet, wanna join ours?  :)  We're rsacrack@vex.net... a late start, but
> we're moving up pretty quickly.  :)

With pleasure 8)

{hasty} ./rc5-client-freebsd -i rsacrack@vex.net
rc5-56-client: Obtaining Key Mask from ``zero.genx.net:2056''.
rc5-56-client: New Media Laboratories, RC5 Key Server
rc5-56-client: Received Keyspace Mask 0x0000000FFFFFFF
rc5-56-client: Start Key 0x6A087CC0000000, trying 268435456 keys.


	Cheers,
	Amancio


> --
> Brian Tao (BT300, taob@risc.org)
> "Though this be madness, yet there is method in't"
> 





Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199703010405.UAA13405>