Bitcoin Forum
June 19, 2024, 06:09:40 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: WHIRLPOOL Hashing Algo?  (Read 1957 times)
fishy (OP)
Sr. Member
****
Offline Offline

Activity: 476
Merit: 250


What do you call a fish with no eyes? A Fsh!


View Profile
June 19, 2013, 01:11:25 AM
 #1

Check this out:
https://en.wikipedia.org/wiki/WHIRLPOOL

\   \  \ \\\\\\\\\\\\\\\\◥◣◢◤//////////////// /  /   /
Win88.me ❖ Fair, Trusted Online BTC Gambling ❖
/   /  / ////////////////◢◤◥◣\\\\\\\\\\\\\\\\ \  \   \
R-T-B
Full Member
***
Offline Offline

Activity: 145
Merit: 100


View Profile
June 19, 2013, 01:15:04 AM
 #2


Been around a while...  There's actually quite a few obscure algorithms out there, Khazad and others had a lot of potential but are all but forgotten now.  If you've ever compiled your own linux kernel you've seen them of course.

It'd be interested to see an examination of their properties as they relate to crypto currencies...  Maybe even some alt coins made from them.  I know Gentoo linux uses Whirlpool to verify package integrity, but beyond that I know nothing about it's properties.

EDIT:  Actually, Khazad is a block cipher, but my point still stands.
nlovric
Full Member
***
Offline Offline

Activity: 336
Merit: 140



View Profile
June 19, 2013, 07:14:16 AM
 #3

Whirlpool is presently the best standard cryptographic hashing function for integrity checks; however, it is not the best for password hashing – for that purpose, bcrypt is presently the best standard one.

There is something even better, but I do not have the money for its' patenting; therefore, I have not even established priority, yet.
broken_pixel
Hero Member
*****
Offline Offline

Activity: 770
Merit: 500



View Profile
June 19, 2013, 09:41:46 AM
 #4

MIght as well.

GA-990FXA-UD5, 1x 7970L, 2x S1, AX1200i, RIVBE, 2x R290x, NEX1500, BTC: 1G9cQix8bMgh35MQ9wY3Rb9yNSSCtnoRmK, DGC: DFo9FcKYsutv9Vx5c5xUzkrt7VJdECZWTM, LTC: LaAN33aktPGaimN5ALL9kjHjuJekfmKfTh
PyPy
Newbie
*
Offline Offline

Activity: 10
Merit: 0


View Profile
July 20, 2013, 01:46:08 PM
 #5

This would be a good idea for a new altcoin.    There is an open source reference implementation of Whirlpool in C already.    But what would really need to changed from the orig bitcoin tree to make this happen?

* replace sha256(sha256(block)) with whirlpool(whirlpool(block))
* support 512 length hashes for blocks and transactions, instead of 256

what else?



PyPy
Newbie
*
Offline Offline

Activity: 10
Merit: 0


View Profile
July 20, 2013, 07:09:45 PM
 #6

wow, there is already an ASIC design for whirlpool:   http://books.google.com/books?id=K0hAoWh8tywC&pg=PA28
nlovric
Full Member
***
Offline Offline

Activity: 336
Merit: 140



View Profile
July 26, 2013, 02:25:45 PM
 #7

wow, there is already an ASIC design for whirlpool:   http://books.google.com/books?id=K0hAoWh8tywC&pg=PA28


Whirlpool was designed by one of the authors of Rijndel a.k.a. the Advanced Encryption Standard (AES).

However, the Secure Hash Algorithm version 3 (SHA3) should be much better. The general final design has been selected, but not specified in full and not standardised. That's the latest information I have.

What I am really looking for are short — e. g. 64-binary-digit-(bit) — output hashing functions for relatively short messages. Happen to know of any good and/or recent ones? Everyone is making long-output functions now, but certain technologies of mine require short-output ones.
tomtommy
Full Member
***
Offline Offline

Activity: 120
Merit: 100



View Profile
July 26, 2013, 03:47:36 PM
 #8



Mining with Washing Machine. Which spin cycles will produce the most Mh/s.
nlovric
Full Member
***
Offline Offline

Activity: 336
Merit: 140



View Profile
July 26, 2013, 06:15:12 PM
Last edit: July 26, 2013, 06:35:13 PM by nlovric
 #9

Mining with Washing Machine. Which spin cycles will produce the most Mh/s.


Yes, the coins of this currency shall be produced through the laundering procedure rather than mining. You will have multiple laundering programs to choose from. The available programs shall depend on the ASIC launderer you're using. The machine shall wash clothes as a source of entropy to make sure cryptoanalysts cannot reproduce the conditions. Once the clothes are washed, it will be difficult to determine their original state, especially if you'll be using a high-quality ASIC launderer.

We can call the currency Wash'n'Go  (WnG).
nlovric
Full Member
***
Offline Offline

Activity: 336
Merit: 140



View Profile
July 26, 2013, 07:10:49 PM
Last edit: July 26, 2013, 09:27:01 PM by nlovric
 #10

MIght as well.


Invest about 100 Bitcoins (BTC) at https://www.bitmit.net/item/15000/?ref=6004 and I will. Priority is valid for 1 year; during this period, patent claims have to be made worldwide. The algorithm shall be free for use with non-commercial Linux, Berkley Systems Design (BSD), and HURD distributions.

I invented it while designing SecuriNet — which is meant to be broken into rathen than being guarded from attacks, one of which will eventually be successfull — and analysing possible attack vectors. Each SecuriNet node must withstand Kriegsmarine Unterseeboot 110 (U-110) and Unterseeboot 559 (U-559) scenarios against Ultra-, and Special-Operations-Executive-(SOE)-like operations, even though it is actually a civillian system to be commercially available to all. Of course, Signals Intelligence (SIGINT) services might be "slightly" unhappy about that, kind of like with Arthur Scherbius' Enigma — a commercial teleprinter sold by Scherbius & Ritter. Smiley

I had contacted Državni zavod za intelektualno vlasništvo — the State Department for Intellectual Property — of the Republic of Croatia and then the Swiss Federal Institute of Intellectual Property in late 2011 and posted — hinted — about it at StackExchange in early 2012, prior to my Internet connection being blocked and put under surveillance on February 24, 2012 UTC after I notified the European Court of Human Rights (ECHR), the Council of Europe (CoE) etc. on February 23, 2012 UTC of the contents of my disk which my psychopathic — basically only biological — father stole from me on August 28, 2009 UTC — first trying to get me to enter the decryption password for several days — and the fact that the Iranian electronic warfare unit hijacked the Lockheed-Martin RQ-170 — reconnaissance unmanned 170 — Sentinel 27 months after the disk — containing regular and backdoor — bouncer 0.2 — access parametres — encrypted using a 6e+30-combinations-scale password — to the Air Force Material Command (AFMC) etc. of the United States of America (USA) was stolen. The delay matches the delay necessary to break the encryotion on common hardware using advanced search patterns or an all-probable-combinations search on Application Specific Integrated Circuits (ASICs). The 6e+30 combinations assumes a basic 84-most-common-password-characters linear attack on the ciphertext. Something like Anticipher can break it in a matter of days.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!