Bitcoin Forum
November 16, 2024, 05:15:23 PM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Are current generation ASICs SHA256(SHA256(x)) implementations?  (Read 2143 times)
mustyoshi (OP)
Sr. Member
****
Offline Offline

Activity: 287
Merit: 250



View Profile
May 15, 2013, 03:40:35 PM
 #1

Does anybody know if they are explicitly double SHA256, or if they simply run the SHA256 twice.
This is important because it also denotes their usefulness outside of Bitcoin.
tom_o
Sr. Member
****
Offline Offline

Activity: 308
Merit: 250


View Profile
May 15, 2013, 03:55:24 PM
 #2

Potentially the fastest password cracking the world has ever seen...
crazyates
Legendary
*
Offline Offline

Activity: 952
Merit: 1000



View Profile
May 15, 2013, 04:55:22 PM
 #3

https://en.bitcoin.it/wiki/Protocol_specification

Tips? 1crazy8pMqgwJ7tX7ZPZmyPwFbc6xZKM9
Previous Trade History - Sale Thread
mustyoshi (OP)
Sr. Member
****
Offline Offline

Activity: 287
Merit: 250



View Profile
May 15, 2013, 05:03:37 PM
 #4

That doesn't tell me if the ASIC hardware does SHA256(SHA256(x)) or if it is SHA256(x) twice.
stevegee58
Legendary
*
Offline Offline

Activity: 916
Merit: 1003



View Profile
May 15, 2013, 05:08:11 PM
 #5

That doesn't tell me if the ASIC hardware does SHA256(SHA256(x)) or if it is SHA256(x) twice.

Yes it does.  You must have missed the part where it said  "dhash(a) = sha256(sha256(a))"


You are in a maze of twisty little passages, all alike.
mustyoshi (OP)
Sr. Member
****
Offline Offline

Activity: 287
Merit: 250



View Profile
May 15, 2013, 05:11:07 PM
 #6

That doesn't tell me if the ASIC hardware does SHA256(SHA256(x)) or if it is SHA256(x) twice.

Yes it does.  You must have missed the part where it said  "dhash(a) = sha256(sha256(a))"


Okay let me rephrase my question, is it possible for the ASIC hardware to just do SHA256(x) instead of SHA256(SHA256(x))?
stevegee58
Legendary
*
Offline Offline

Activity: 916
Merit: 1003



View Profile
May 15, 2013, 05:15:02 PM
 #7

That doesn't tell me if the ASIC hardware does SHA256(SHA256(x)) or if it is SHA256(x) twice.

Yes it does.  You must have missed the part where it said  "dhash(a) = sha256(sha256(a))"


Okay let me rephrase my question, is it possible for the ASIC hardware to just do SHA256(x) instead of SHA256(SHA256(x))?

No.  The ASIC miner can only do the one thing and that's all.  That's whey they're called "Application Specific Integrated Circuits"

You are in a maze of twisty little passages, all alike.
mgio
Hero Member
*****
Offline Offline

Activity: 546
Merit: 500


View Profile
May 15, 2013, 05:43:37 PM
 #8

Try looking at the specs that Avalon has been releasing?
turtle83
Sr. Member
****
Offline Offline

Activity: 322
Merit: 250


Supersonic


View Profile WWW
May 15, 2013, 05:44:41 PM
 #9

That doesn't tell me if the ASIC hardware does SHA256(SHA256(x)) or if it is SHA256(x) twice.

Yes it does.  You must have missed the part where it said  "dhash(a) = sha256(sha256(a))"


Okay let me rephrase my question, is it possible for the ASIC hardware to just do SHA256(x) instead of SHA256(SHA256(x))?

AFAIK neither. You cant use the ASIC to compute SHA256(x) OR SHA256(SHA256(x)) . A lot of the logic is inside the chip. Basically it gets the data similar to bitcoin protocol, and runs a loop to find the right nonce. The chip itself wont return the generated hashes. Also, the accepted size of "x" would probably be only the exact size used in bitcoin protocol. So I think your quest to find alt purpose is in vain.

tom_o
Sr. Member
****
Offline Offline

Activity: 308
Merit: 250


View Profile
May 17, 2013, 12:16:19 PM
 #10

That doesn't tell me if the ASIC hardware does SHA256(SHA256(x)) or if it is SHA256(x) twice.

Yes it does.  You must have missed the part where it said  "dhash(a) = sha256(sha256(a))"


Okay let me rephrase my question, is it possible for the ASIC hardware to just do SHA256(x) instead of SHA256(SHA256(x))?

AFAIK neither. You cant use the ASIC to compute SHA256(x) OR SHA256(SHA256(x)) . A lot of the logic is inside the chip. Basically it gets the data similar to bitcoin protocol, and runs a loop to find the right nonce. The chip itself wont return the generated hashes. Also, the accepted size of "x" would probably be only the exact size used in bitcoin protocol. So I think your quest to find alt purpose is in vain.


That's good IMO, I had a bad feeling about 5Ghash+ password crackers being released into the wild with no oversight.
stevegee58
Legendary
*
Offline Offline

Activity: 916
Merit: 1003



View Profile
May 17, 2013, 01:36:31 PM
 #11

That's good IMO, I had a bad feeling about 5Ghash+ password crackers being released into the wild with no oversight.

Oversight?  You're sounding like a statist.

I say release 5 Gh/s password crackers into the wild and let the chips fall where they may!

You are in a maze of twisty little passages, all alike.
turtle83
Sr. Member
****
Offline Offline

Activity: 322
Merit: 250


Supersonic


View Profile WWW
May 17, 2013, 01:40:09 PM
 #12

That's good IMO, I had a bad feeling about 5Ghash+ password crackers being released into the wild with no oversight.

Oversight?  You're sounding like a statist.

I say release 5 Gh/s password crackers into the wild and let the chips fall where they may!

+1

Id expect this to be the what people replacing FPGA with ASIC do...  Time to use scrypt with a very high N for security purposes...

Schrankwand
Full Member
***
Offline Offline

Activity: 224
Merit: 100


View Profile
May 17, 2013, 08:40:25 PM
 #13

That doesn't tell me if the ASIC hardware does SHA256(SHA256(x)) or if it is SHA256(x) twice.

Yes it does.  You must have missed the part where it said  "dhash(a) = sha256(sha256(a))"


Okay let me rephrase my question, is it possible for the ASIC hardware to just do SHA256(x) instead of SHA256(SHA256(x))?

AFAIK neither. You cant use the ASIC to compute SHA256(x) OR SHA256(SHA256(x)) . A lot of the logic is inside the chip. Basically it gets the data similar to bitcoin protocol, and runs a loop to find the right nonce. The chip itself wont return the generated hashes. Also, the accepted size of "x" would probably be only the exact size used in bitcoin protocol. So I think your quest to find alt purpose is in vain.


That's good IMO, I had a bad feeling about 5Ghash+ password crackers being released into the wild with no oversight.

Well, that could at least force people to migrate to AES or possibly Threefish soon with whatever they do.
k9quaint
Legendary
*
Offline Offline

Activity: 1190
Merit: 1000



View Profile
May 17, 2013, 08:50:52 PM
 #14

That's good IMO, I had a bad feeling about 5Ghash+ password crackers being released into the wild with no oversight.

Oversight?  You're sounding like a statist.

I say release 5 Gh/s password crackers into the wild and let the chips fall where they may!

+1

Id expect this to be the what people replacing FPGA with ASIC do...  Time to use scrypt with a very high N for security purposes...

Or SHA-512. But yeah, bitcoin FPGAs usually take getwork/stratum data as input and give as output a 32-bit nonce. They do not transmit the hashes outside the chip because 300Million x 256bit per second is 76.8Gbits of bandwidth. So no, they can't really be used to crack passwords.
I would imagine that ASICs use the same sort of paradigm.

Bitcoin is backed by the full faith and credit of YouTube comments.
turtle83
Sr. Member
****
Offline Offline

Activity: 322
Merit: 250


Supersonic


View Profile WWW
May 17, 2013, 09:33:40 PM
 #15

That's good IMO, I had a bad feeling about 5Ghash+ password crackers being released into the wild with no oversight.

Oversight?  You're sounding like a statist.

I say release 5 Gh/s password crackers into the wild and let the chips fall where they may!

+1

Id expect this to be the what people replacing FPGA with ASIC do...  Time to use scrypt with a very high N for security purposes...

Or SHA-512. But yeah, bitcoin FPGAs usually take getwork/stratum data as input and give as output a 32-bit nonce. They do not transmit the hashes outside the chip because 300Million x 256bit per second is 76.8Gbits of bandwidth. So no, they can't really be used to crack passwords.
I would imagine that ASICs use the same sort of paradigm.


Yeah ASIC work in similar manner IMHO, but what i mean is FPGA can be re-programmed to find hashes. No need for bandwidth. Send target hash. let fpga run bruteforce , and return valid cleartext if found. 200MH sha256(sha256(x)) ~ 400 MH sha256(x).

6 character lower case + upper case + number = 56800235584 combinations or ~56800 MH so 142 seconds on single lx150
prolly take lesser time since data sizes is small... dunno...

k9quaint
Legendary
*
Offline Offline

Activity: 1190
Merit: 1000



View Profile
May 18, 2013, 12:23:00 AM
 #16

That's good IMO, I had a bad feeling about 5Ghash+ password crackers being released into the wild with no oversight.

Oversight?  You're sounding like a statist.

I say release 5 Gh/s password crackers into the wild and let the chips fall where they may!

+1

Id expect this to be the what people replacing FPGA with ASIC do...  Time to use scrypt with a very high N for security purposes...

Or SHA-512. But yeah, bitcoin FPGAs usually take getwork/stratum data as input and give as output a 32-bit nonce. They do not transmit the hashes outside the chip because 300Million x 256bit per second is 76.8Gbits of bandwidth. So no, they can't really be used to crack passwords.
I would imagine that ASICs use the same sort of paradigm.


Yeah ASIC work in similar manner IMHO, but what i mean is FPGA can be re-programmed to find hashes. No need for bandwidth. Send target hash. let fpga run bruteforce , and return valid cleartext if found. 200MH sha256(sha256(x)) ~ 400 MH sha256(x).

6 character lower case + upper case + number = 56800235584 combinations or ~56800 MH so 142 seconds on single lx150
prolly take lesser time since data sizes is small... dunno...

Yep. Fortunately FPGAs are pricey and make up a very small portion of the hashrate. The current generation of ASICs cannot be easily re-purposed to crack passwords. As you say though, one could design an ASIC to crack password hashes pretty easily.

Bitcoin is backed by the full faith and credit of YouTube comments.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!