Bitcoin Forum
May 09, 2024, 08:13:01 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2]  All
  Print  
Author Topic: SHA-256 as a boolean function  (Read 11308 times)
jake262144
Full Member
***
Offline Offline

Activity: 210
Merit: 100


View Profile
January 08, 2012, 06:14:17 PM
 #21

I think something like this http://hashcat.net/wiki/mask_attack would be more reasonable/realistic. It used to take me 6 hours to brute force a WPA PSK of 8 digits, now I can do it in under 30 minutes.

Let's quote from the page you're linking to: In Mask attack we know about humans and how they design passwords.

Mask attack is NO BETTER than a traditional brute-force attack. You're breaking your own (I sure hope so) WPA key faster only because it's a shitty key.
Attempting to break a sufficiently random passphrase, like RU8wNkg4R2uTQ0tAx will only mean that you'll have to try most of the possible passphrase-space.

I regret to say, the example you posted (breaking a dictionary-based WPA passphrase) is completely orthogonal to bitcoin mining.
1715285581
Hero Member
*
Offline Offline

Posts: 1715285581

View Profile Personal Message (Offline)

Ignore
1715285581
Reply with quote  #2

1715285581
Report to moderator
1715285581
Hero Member
*
Offline Offline

Posts: 1715285581

View Profile Personal Message (Offline)

Ignore
1715285581
Reply with quote  #2

1715285581
Report to moderator
"I'm sure that in 20 years there will either be very large transaction volume or no volume." -- Satoshi
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715285581
Hero Member
*
Offline Offline

Posts: 1715285581

View Profile Personal Message (Offline)

Ignore
1715285581
Reply with quote  #2

1715285581
Report to moderator
1715285581
Hero Member
*
Offline Offline

Posts: 1715285581

View Profile Personal Message (Offline)

Ignore
1715285581
Reply with quote  #2

1715285581
Report to moderator
1715285581
Hero Member
*
Offline Offline

Posts: 1715285581

View Profile Personal Message (Offline)

Ignore
1715285581
Reply with quote  #2

1715285581
Report to moderator
Geremia
Sr. Member
****
Offline Offline

Activity: 502
Merit: 251


View Profile WWW
April 30, 2013, 04:34:52 AM
 #22

Check out this.

BTC tip jar | my BTC wiki, BTC StackExchange | Tox ID: 65C3E8810738AD9D175234808FCB317A1103632903436203D45411AE97C03F54C34861AB6663
Join Kraken. | The best, free book on Bitcoin: Mastering Bitcoin
Nos cum prole pia benedicat Virgo Maria.
kokjo
Legendary
*
Offline Offline

Activity: 1050
Merit: 1000

You are WRONG!


View Profile
April 30, 2013, 07:53:27 AM
 #23

Check out this.
+1 this stuff is cool!

"The whole problem with the world is that fools and fanatics are always so certain of themselves and wiser people so full of doubts." -Bertrand Russell
Geremia
Sr. Member
****
Offline Offline

Activity: 502
Merit: 251


View Profile WWW
April 30, 2013, 04:03:39 PM
 #24

Yes, it's certainly interesting, but computationally it appears it can be no more efficient than brute force…
Also, if it does work better than even ASIC brute-force devices, it wouldn't adversely affect Bitcoin, even if Bitcoin doesn't have a contingency plan for partially-breaking SHA-256 yet.

BTC tip jar | my BTC wiki, BTC StackExchange | Tox ID: 65C3E8810738AD9D175234808FCB317A1103632903436203D45411AE97C03F54C34861AB6663
Join Kraken. | The best, free book on Bitcoin: Mastering Bitcoin
Nos cum prole pia benedicat Virgo Maria.
Pages: « 1 [2]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!