Skip to main content
. 2022 Dec 16;8:e1185. doi: 10.7717/peerj-cs.1185

Table 4. Passwords decrypted and time consumed by all attempts using dictionaries and applying rules.

Dictionary Rules Words Time consumed Decrypted
ESSIDs best64.rule 1,432,354 3 min 2
Names best64.rule 2,017,400 4 min 1