Title: Future : Effect of mining on use of SHA-2 in general ... (Scenario for 2014 & +) Post by: Transisto on July 03, 2012, 05:39:13 PM How and when will the industries using SHA-2 for securing sensitive data will feel compelled to change algorithm because of mining hardware manufacturing ?
The current generation of BFL ASICs may not be of any use for cracking password but future ASICs products will want to take advantage of it's ease or implementation, increasing profits and lessening risks. See : https://bitcointalk.org/index.php?topic=87476.msg968530#msg968530 Back in the days it used to be secure to use 9+ character passwords for securing a WiFi AP,,, now 12 is the norm. I fear that eventually people willing to use a password they can remember will not be able to do so with anything sha2 secured.
(might be related) : Cryptanalysis of AES and SHA-2: how far we are from compromising worldwide encryption and hashing standards (http://research.microsoft.com/apps/video/default.aspx?id=161832) |