Bitcoin Forum
May 27, 2024, 12:43:10 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: how applicable are blockchain eruptors to password cracking?  (Read 609 times)
Cryddit (OP)
Legendary
*
Offline Offline

Activity: 924
Merit: 1129


View Profile
November 06, 2013, 03:22:56 PM
 #1


On most Unix systems, there is an /etc/shadow file that holds hashes of all the users' passwords.  Security auditing and security compromising programs often use this file as input and hash a bunch of password guesses to see if they can find passwords (preimages) to go with the hashes.

Now, for completely unrelated reasons, we've built hardware that does hashes four or five orders of magnitude faster than they were done before.  Have we created a password-guessing security threat that didn't exist previously?  Or are there good reasons why blockchain eruptors etc can't be used that way?

Remember remember the 5th of November
Legendary
*
Offline Offline

Activity: 1862
Merit: 1011

Reverse engineer from time to time


View Profile
November 06, 2013, 03:31:01 PM
 #2

Non applicable at all. Well, slightly, but since miners do 2xSHA256, it's unlikely it will affect anything. And it's only good for SHA256.

BTC:1AiCRMxgf1ptVQwx6hDuKMu4f7F27QmJC2
Ecurb123
Full Member
***
Offline Offline

Activity: 182
Merit: 100


View Profile
November 07, 2013, 06:00:11 PM
 #3

that makes me wonder then, what else uses sha256?
mjc
Hero Member
*****
Offline Offline

Activity: 588
Merit: 500


Available on Kindle


View Profile WWW
November 07, 2013, 06:55:04 PM
 #4

I had a hammer that drives nails really good.  Then I bought a nail gun.  Now the hammer is not as useful, but that doesn't mean I'll use it to change the tire on my car.

The ASIC devices are very specific to the Bitcoin mining process.  The only thing they would be good for is any other coin that can be mined with the same process, like NMC.

The life of a piece of Mining hardware today is likely to be less than 6 months, before it cost more to run then it will make.

Kindle : Bitcoin Step by Step (2nd Ed) : http://www.amazon.com/Bitcoin-Step-by-ebook/dp/B00A1CUQQU
Kindle : Bitcoin Mining Step by Step : http://www.amazon.com/Bitcoin-Step-by-ebook/dp/B00A1CUQQU
Facebook :  https://www.facebook.com/BitcoinStepByStep     Twitter : @BitcoinSbS
michagogo
Member
**
Offline Offline

Activity: 80
Merit: 10


View Profile
November 08, 2013, 02:25:59 AM
 #5

that makes me wonder then, what else uses sha256?

It isn't just SHA256, it's double-SHA256. Not SHA256(block), but rather SHA256(SHA256(block)). That is the only thing that bitcoin mining ASICs can do.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!