Open roycewilliams opened 3 years ago
I second this request - would be great to have Argon2 and yescrypt in hashcat, ideally optimized roughly to the same extent so that performance comparisons would make sense. There is already a reasonably optimized implementation of Argon2 in OpenCL (although more work on it is needed - flavors, tuning). For yescrypt, the closest to being optimized are probably mining implementations of the older yescrypt 0.5, which I referenced on the PHC list in 2018 (see also my "reply" on the next day with some corrections). I think more revisions of those appeared since. A more complete implementation updated to 1.0+ would be needed for hashcat.
- Not yet supported by john-jumbo(!)
This is partially correct. While there's no native support for yescrypt in john-jumbo, there is via --format=crypt
when running on a system that has such support in its libcrypt (e.g., Ubuntu 20.04+, Fedora 29+). Of course, native support should be added soon (and will provide better performance through moving memory (de)allocations out of the loop).
@solardiz, thanks - I didn't even know about --format=crypt
! Description updated.
It's now the default hashing method on Debian 11 (https://www.debian.org/releases/bullseye/amd64/release-notes/ch-information.en.html#pam-default-password).
used as default hashing in Ubuntu 22.04 (https://manpages.ubuntu.com/manpages/jammy/en/man5/crypt.5.html, https://manpages.ubuntu.com/manpages/jammy/man8/pam_unix.8.html)
kore logic used yescrypt hashes in 2022 contest as one of high cost solving tasks...
Nowadays Fedora uses this hashing algorithm as default, too After more than a year from the opening of this issue, this is not "so new"
This is indeed not new anymore and most recent distros use this hashing format now.
Two years have passed...
Hi will this feature be added anytime in this decade? yescrypt is now the default hashing for many popular distros lol
For those wondering why yescrypt hasn't been implemented yet - it's not dev laziness, it's just that yescrypt is by design extremely slow and inefficient to run on GPUs but faster on CPUs and given Hashcat is a GPU-oriented program, this is a little awkward. yescrypt is a very complex algorithm and Solar Designer is a major contributor to John the Ripper so he certainly knows how to make a difficult-to-crack algorithm. As Royce said, you can use John for now but also doesn't have GPU code so it'll be run on CPU (if you have the libraries for it)
any update on this being implemented soon?
This and argon2 would be great additions to add.
Updates?
Yescrypt is a notable algorithm:
Where used:
Tool coverage:
--format=crypt
)Limitations:
Tech details: