Hacking

Rodney Peck II rodney at sun.ipl.rpi.edu
Tue Apr 2 08:29:26 AEST 1991


In article <1991Apr1.173824.20323 at odin.corp.sgi.com> pkr at sgi.com (Phil Ronzone) writes:
>In article <PJNESSER.91Mar27142853 at mbunix.mitre.org> pjnesser at mbunix.mitre.org (Nesser) writes:
>>Someone in this thread pointed out that the way to crack passwords is to
>>maintain a list of encrypted dictionary words and compare against that.  I
>>just want to point out that this is an amazingly expensive way to do it
>>since you have to keep 4096 strings for each word.  Disk space is getting
>>cheaper but ...  It's not that I've figured out a great way to do it myself
>>but ... :-)
>
>
>Well, assuming 100,000 words of 13 characters each, for each of 4096
>possibilities, that gives us 5,324,800,000 bytes. Now, with the
>750MB and 1.2G 5.25" disk drives around, I'd probably have to have
>several of the drives, OR, maybe use a smaller dictionary.

or three exabyte tapes with indexing thrown into the extra 700 meg left over.
cost to you from your local photo/camera shop:  $7.00 per 2 gigabytes.

>100,000 words is a LOT of words .....

not really.

-- 
Rodney



More information about the Comp.unix.wizards mailing list