Date: Fri, 28 Feb 1997 20:05:43 -0800 From: Amancio Hasty <hasty@rah.star-gate.com> To: Brian Tao <taob@risc.org> Cc: FREEBSD-CHAT-L <freebsd-chat@freebsd.org> Subject: Re: RSA 56-bit key challenge Message-ID: <199703010405.UAA13405@rah.star-gate.com> In-Reply-To: Your message of "Fri, 28 Feb 1997 22:59:05 EST." <Pine.BSF.3.95.970228225716.7982C-100000@alpha.risc.org>
next in thread | previous in thread | raw e-mail | index | archive | help
>From The Desk Of Brian Tao : > On Fri, 28 Feb 1997, Amancio Hasty wrote: > > > > {hasty} ./rc5-client-freebsd -m > > rc5-56-client: Performance testing with 1000000 crypts > > rc5-56-client: Complete in 3.347 seconds. (298812.07 keys/sec) > > > > The result looks to fast for me 8) > > > > So the next question am I am running the reference benchmark correctly? > > That looks right to me. If you're not affiliated with any team > yet, wanna join ours? :) We're rsacrack@vex.net... a late start, but > we're moving up pretty quickly. :) With pleasure 8) {hasty} ./rc5-client-freebsd -i rsacrack@vex.net rc5-56-client: Obtaining Key Mask from ``zero.genx.net:2056''. rc5-56-client: New Media Laboratories, RC5 Key Server rc5-56-client: Received Keyspace Mask 0x0000000FFFFFFF rc5-56-client: Start Key 0x6A087CC0000000, trying 268435456 keys. Cheers, Amancio > -- > Brian Tao (BT300, taob@risc.org) > "Though this be madness, yet there is method in't" >
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199703010405.UAA13405>