On Wed, Dec  4, 2013 at 12:42:08PM -0500, Bruce Momjian wrote:
> On Tue, May  7, 2013 at 03:47:43PM -0700, Miles Elam wrote:
> > Personally I've found the relative times instructive, merely outdated.  
> > Perhaps
> > using md5 as a baseline and evaluating estimates relative to that baseline?
> > 
> > md5 = 1
> > sha1 = 4
> > crypt-des = 7
> > crypt-md5 = 1,000
> > crypt-bf/5 = 12,500
> > crypt-bf/6 = 25,000
> > crypt-bf/7 = 50,000
> > crypt-bf/8 = 100,000
> > 
> > This way, with the caveat that performance will vary from machine to 
> > machine,
> > there is a sense of the relative costs of using each algorithm, which does 
> > not
> > change as wildly with time.  It lets people know how bad md5 and sha1 are 
> > for
> > protecting passwords et al.  It also demonstrates that each turn of 
> > blowfish in
> > this module effectively doubles the time needed to crack and halves the 
> > number
> > of hashes one can perform.
> > 
> > In short, I'd hate for the baby to be thrown out with the bathwater.
> 
> I have used your new testing times, plus added these relative
> measurements, which shoud give us the best of both worlds.  Patch
> attached; you can see the results here:


Patch applied.  Thanks.  I updated the patch to say Intel i3..

-- 
  Bruce Momjian  <br...@momjian.us>        http://momjian.us
  EnterpriseDB                             http://enterprisedb.com

  + Everyone has their own god. +


-- 
Sent via pgsql-docs mailing list (pgsql-docs@postgresql.org)
To make changes to your subscription:
http://www.postgresql.org/mailpref/pgsql-docs

Reply via email to