2F633CBE3EC02B9401000000007000000
2F633CBE3EC02B9401000000009000000
021c20007f8c8984d403a695494d6afbff37f55a01c8bd1aafb9b958fa9485bb02
- Done: Total time 00s
Priv: 0x2F633CBE3EC02B9401000000008000000
26 bit is crackable in less than a second even if using slow-as-shit Python script, which is thousands of times slower than some native fast code.
It only takes around 5000 or so point additions to find the key.
this same test
Kangaroo 2.2 (JeanLucPons) : found the key in 15 seconds
Kangaroo 2.3 (256-bit) : 0.2 seconds
Etar-Kangaroo : no result
Rotor-Cuda: found key in 15 seconds - like Kangaroo 2.2
I am not sure if I am starting those tools with the correct options. I'm new in town.
I joined here because of his posts. Digaran is the undisputed king here.