Bitcoin Forum
December 13, 2024, 09:07:25 PM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: kryptoanalysis for sha(sha(sha.....))) and CPU error rate.  (Read 564 times)
blub (OP)
Member
**
Offline Offline

Activity: 88
Merit: 10


View Profile
November 20, 2013, 06:10:57 PM
 #1

Im thinking about making a Brainwallet with following technique:

take a rememberable passphrase and hash it about 100 billion times. This should take a few days on a decent cpu, and efectly render bruteforcing impossible for some years to come.

Has there been any serious analysis of the sha2 hash under this conditions? Worst case would be the chained hashing converging against some constant value...

Second problem: How high is the probability of a cpu not making a single mistake in the process?

Geremia
Sr. Member
****
Offline Offline

Activity: 507
Merit: 253


View Profile WWW
November 20, 2013, 06:56:05 PM
 #2

Worst case would be the chained hashing converging against some constant value...
Would that really happen?

BTC tip jar | my BTC wiki, BTC StackExchange | Tox ID: 65C3E8810738AD9D175234808FCB317A1103632903436203D45411AE97C03F54C34861AB6663
Join Kraken. | The best, free book on Bitcoin: Mastering Bitcoin
Nos cum prole pia benedicat Virgo Maria.
grue
Legendary
*
Offline Offline

Activity: 2058
Merit: 1462



View Profile
November 20, 2013, 08:24:22 PM
 #3

see: https://en.wikipedia.org/wiki/Key_stretching

It is pitch black. You are likely to be eaten by a grue.

Adblock for annoying signature ads | Enhanced Merit UI
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!