[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <035c01d067ec$7bbf1ed0$733d5c70$@stricture-group.com>
Date: Thu, 26 Mar 2015 10:44:17 -0700
From: "Jeremi M Gosney" <jgosney@...icture-group.com>
To: <discussions@...sword-hashing.net>
Subject: RE: [PHC] Another PHC candidates "mechanical" tests (ROUND2)
> -----Original Message-----
> From: Marcos Simplicio
> Sent: Thursday, March 26, 2015 10:29
>
> Hum... That makes me think we need to include bcrypt in our GPU
> benchmarks and see what happens. I'm not a GPU specialist, but we do
> have a person working with the GPU implementations and the results shown
> in our report (Sec. 7.3, Figure 20) are that, in the best conditions
> from an attacker's perspective and for a memory usage of 2.3 MB, the
> GPU-based implementation was 4.5 times slower (in terms of throughput)
> than in the CPU.
Typically when attacking bcrypt, CPU is the preferred platform. Current high-end GPUs are roughly the same speed as older high-end CPUs with bcrypt, and are a fair amount slower than current high-end CPUs.
Using bcrypt with cost of 05 (as traditionally used for benchmarking):
R9 290X: 7 KH/s
GTX 980: 7.5 KH/s
Xeon X5670: 8 KH/s
i7-5960X: 14.5 KH/s
Powered by blists - more mailing lists