From: Performance evaluation of Cuckoo filters as an enhancement tool for password cracking
Subdata set | Size of the original leaked file (MB) | # Hashes of the original leaked file | #Cracked hashes using JtR | #Fake hashes introduced | #Total number of hashes | Size of the filled file tmp (MB) |
---|---|---|---|---|---|---|
1 | 134 | 3,897,669 | 3,897,669 | 3,897,668 | 7,795,337 | 340 |
2 | 67 | 1,948,834 | 1,948,834 | 1,948,833 | 3,897,667 | 168 |
3 | 34 | 974,417 | 974,417 | 974,416 | 1,948,833 | 84 |
4 | 17 | 487,208 | 487,208 | 487,207 | 974,415 | 42 |
5 | 8.3 | 243,604 | 243,604 | 243,603 | 487,207 | 20.7 |
6 | 4.2 | 121,802 | 121,802 | 121,801 | 243,603 | 10.3 |
7 | 2.1 | 60,901 | 60,901 | 60,900 | 121,801 | 5.1 |
8 | 1 | 30,450 | 30,450 | 30,449 | 60,899 | 2.6 |
9 | 0.5341 | 15,225 | 15,225 | 15,224 | 30,449 | 1.3 |
10 | 0.267 | 7612 | 7612 | 7611 | 15,223 | 0.6587 |
11 | 0.1335 | 3806 | 3806 | 3805 | 7611 | 0.3318 |
12 | 0.0667 | 1903 | 1903 | 1902 | 3805 | 0.1679 |