mustyoshi (OP)
|
|
May 15, 2013, 03:40:35 PM |
|
Does anybody know if they are explicitly double SHA256, or if they simply run the SHA256 twice. This is important because it also denotes their usefulness outside of Bitcoin.
|
|
|
|
tom_o
|
|
May 15, 2013, 03:55:24 PM |
|
Potentially the fastest password cracking the world has ever seen...
|
|
|
|
crazyates
Legendary
Offline
Activity: 952
Merit: 1000
|
|
May 15, 2013, 04:55:22 PM |
|
|
|
|
|
mustyoshi (OP)
|
|
May 15, 2013, 05:03:37 PM |
|
That doesn't tell me if the ASIC hardware does SHA256(SHA256(x)) or if it is SHA256(x) twice.
|
|
|
|
stevegee58
Legendary
Offline
Activity: 916
Merit: 1003
|
|
May 15, 2013, 05:08:11 PM |
|
That doesn't tell me if the ASIC hardware does SHA256(SHA256(x)) or if it is SHA256(x) twice. Yes it does. You must have missed the part where it said "dhash(a) = sha256(sha256(a))"
|
You are in a maze of twisty little passages, all alike.
|
|
|
mustyoshi (OP)
|
|
May 15, 2013, 05:11:07 PM |
|
That doesn't tell me if the ASIC hardware does SHA256(SHA256(x)) or if it is SHA256(x) twice. Yes it does. You must have missed the part where it said "dhash(a) = sha256(sha256(a))" Okay let me rephrase my question, is it possible for the ASIC hardware to just do SHA256(x) instead of SHA256(SHA256(x))?
|
|
|
|
stevegee58
Legendary
Offline
Activity: 916
Merit: 1003
|
|
May 15, 2013, 05:15:02 PM |
|
That doesn't tell me if the ASIC hardware does SHA256(SHA256(x)) or if it is SHA256(x) twice. Yes it does. You must have missed the part where it said "dhash(a) = sha256(sha256(a))" Okay let me rephrase my question, is it possible for the ASIC hardware to just do SHA256(x) instead of SHA256(SHA256(x))? No. The ASIC miner can only do the one thing and that's all. That's whey they're called "Application Specific Integrated Circuits"
|
You are in a maze of twisty little passages, all alike.
|
|
|
mgio
|
|
May 15, 2013, 05:43:37 PM |
|
Try looking at the specs that Avalon has been releasing?
|
|
|
|
turtle83
|
|
May 15, 2013, 05:44:41 PM |
|
That doesn't tell me if the ASIC hardware does SHA256(SHA256(x)) or if it is SHA256(x) twice. Yes it does. You must have missed the part where it said "dhash(a) = sha256(sha256(a))" Okay let me rephrase my question, is it possible for the ASIC hardware to just do SHA256(x) instead of SHA256(SHA256(x))? AFAIK neither. You cant use the ASIC to compute SHA256(x) OR SHA256(SHA256(x)) . A lot of the logic is inside the chip. Basically it gets the data similar to bitcoin protocol, and runs a loop to find the right nonce. The chip itself wont return the generated hashes. Also, the accepted size of "x" would probably be only the exact size used in bitcoin protocol. So I think your quest to find alt purpose is in vain.
|
|
|
|
tom_o
|
|
May 17, 2013, 12:16:19 PM |
|
That doesn't tell me if the ASIC hardware does SHA256(SHA256(x)) or if it is SHA256(x) twice. Yes it does. You must have missed the part where it said "dhash(a) = sha256(sha256(a))" Okay let me rephrase my question, is it possible for the ASIC hardware to just do SHA256(x) instead of SHA256(SHA256(x))? AFAIK neither. You cant use the ASIC to compute SHA256(x) OR SHA256(SHA256(x)) . A lot of the logic is inside the chip. Basically it gets the data similar to bitcoin protocol, and runs a loop to find the right nonce. The chip itself wont return the generated hashes. Also, the accepted size of "x" would probably be only the exact size used in bitcoin protocol. So I think your quest to find alt purpose is in vain. That's good IMO, I had a bad feeling about 5Ghash+ password crackers being released into the wild with no oversight.
|
|
|
|
stevegee58
Legendary
Offline
Activity: 916
Merit: 1003
|
|
May 17, 2013, 01:36:31 PM |
|
That's good IMO, I had a bad feeling about 5Ghash+ password crackers being released into the wild with no oversight.
Oversight? You're sounding like a statist. I say release 5 Gh/s password crackers into the wild and let the chips fall where they may!
|
You are in a maze of twisty little passages, all alike.
|
|
|
turtle83
|
|
May 17, 2013, 01:40:09 PM |
|
That's good IMO, I had a bad feeling about 5Ghash+ password crackers being released into the wild with no oversight.
Oversight? You're sounding like a statist. I say release 5 Gh/s password crackers into the wild and let the chips fall where they may! +1 Id expect this to be the what people replacing FPGA with ASIC do... Time to use scrypt with a very high N for security purposes...
|
|
|
|
Schrankwand
|
|
May 17, 2013, 08:40:25 PM |
|
That doesn't tell me if the ASIC hardware does SHA256(SHA256(x)) or if it is SHA256(x) twice. Yes it does. You must have missed the part where it said "dhash(a) = sha256(sha256(a))" Okay let me rephrase my question, is it possible for the ASIC hardware to just do SHA256(x) instead of SHA256(SHA256(x))? AFAIK neither. You cant use the ASIC to compute SHA256(x) OR SHA256(SHA256(x)) . A lot of the logic is inside the chip. Basically it gets the data similar to bitcoin protocol, and runs a loop to find the right nonce. The chip itself wont return the generated hashes. Also, the accepted size of "x" would probably be only the exact size used in bitcoin protocol. So I think your quest to find alt purpose is in vain. That's good IMO, I had a bad feeling about 5Ghash+ password crackers being released into the wild with no oversight. Well, that could at least force people to migrate to AES or possibly Threefish soon with whatever they do.
|
|
|
|
k9quaint
Legendary
Offline
Activity: 1190
Merit: 1000
|
|
May 17, 2013, 08:50:52 PM |
|
That's good IMO, I had a bad feeling about 5Ghash+ password crackers being released into the wild with no oversight.
Oversight? You're sounding like a statist. I say release 5 Gh/s password crackers into the wild and let the chips fall where they may! +1 Id expect this to be the what people replacing FPGA with ASIC do... Time to use scrypt with a very high N for security purposes... Or SHA-512. But yeah, bitcoin FPGAs usually take getwork/stratum data as input and give as output a 32-bit nonce. They do not transmit the hashes outside the chip because 300Million x 256bit per second is 76.8Gbits of bandwidth. So no, they can't really be used to crack passwords. I would imagine that ASICs use the same sort of paradigm.
|
Bitcoin is backed by the full faith and credit of YouTube comments.
|
|
|
turtle83
|
|
May 17, 2013, 09:33:40 PM |
|
That's good IMO, I had a bad feeling about 5Ghash+ password crackers being released into the wild with no oversight.
Oversight? You're sounding like a statist. I say release 5 Gh/s password crackers into the wild and let the chips fall where they may! +1 Id expect this to be the what people replacing FPGA with ASIC do... Time to use scrypt with a very high N for security purposes... Or SHA-512. But yeah, bitcoin FPGAs usually take getwork/stratum data as input and give as output a 32-bit nonce. They do not transmit the hashes outside the chip because 300Million x 256bit per second is 76.8Gbits of bandwidth. So no, they can't really be used to crack passwords. I would imagine that ASICs use the same sort of paradigm. Yeah ASIC work in similar manner IMHO, but what i mean is FPGA can be re-programmed to find hashes. No need for bandwidth. Send target hash. let fpga run bruteforce , and return valid cleartext if found. 200MH sha256(sha256(x)) ~ 400 MH sha256(x). 6 character lower case + upper case + number = 56800235584 combinations or ~56800 MH so 142 seconds on single lx150 prolly take lesser time since data sizes is small... dunno...
|
|
|
|
k9quaint
Legendary
Offline
Activity: 1190
Merit: 1000
|
|
May 18, 2013, 12:23:00 AM |
|
That's good IMO, I had a bad feeling about 5Ghash+ password crackers being released into the wild with no oversight.
Oversight? You're sounding like a statist. I say release 5 Gh/s password crackers into the wild and let the chips fall where they may! +1 Id expect this to be the what people replacing FPGA with ASIC do... Time to use scrypt with a very high N for security purposes... Or SHA-512. But yeah, bitcoin FPGAs usually take getwork/stratum data as input and give as output a 32-bit nonce. They do not transmit the hashes outside the chip because 300Million x 256bit per second is 76.8Gbits of bandwidth. So no, they can't really be used to crack passwords. I would imagine that ASICs use the same sort of paradigm. Yeah ASIC work in similar manner IMHO, but what i mean is FPGA can be re-programmed to find hashes. No need for bandwidth. Send target hash. let fpga run bruteforce , and return valid cleartext if found. 200MH sha256(sha256(x)) ~ 400 MH sha256(x). 6 character lower case + upper case + number = 56800235584 combinations or ~56800 MH so 142 seconds on single lx150 prolly take lesser time since data sizes is small... dunno... Yep. Fortunately FPGAs are pricey and make up a very small portion of the hashrate. The current generation of ASICs cannot be easily re-purposed to crack passwords. As you say though, one could design an ASIC to crack password hashes pretty easily.
|
Bitcoin is backed by the full faith and credit of YouTube comments.
|
|
|
|