Bitcoin Forum
May 07, 2024, 08:04:55 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1] 2 3 4 »  All
  Print  
Author Topic: Japanese researchers break 41 out of 64 steps of SHA256 with preimage attack.  (Read 8597 times)
TheoryOfBitcoin (OP)
Newbie
*
Offline Offline

Activity: 38
Merit: 0


View Profile
December 17, 2013, 02:06:13 AM
 #1

This affects Bitcoin massively because bitcoin uses SHA256 hashes for transaction IDs and blocks. A preimage attack is when you can find a value that has a specific hash value. For example, when researchers break the full 64 steps of SHA256, they will be able to double spend transactions and mine blocks near infinitely fast.

Here is the paper http://www.scholr.ly/paper/2078146/preimage-attacks-on-41-step-sha-256-and-46-step-sha-512
1715069095
Hero Member
*
Offline Offline

Posts: 1715069095

View Profile Personal Message (Offline)

Ignore
1715069095
Reply with quote  #2

1715069095
Report to moderator
1715069095
Hero Member
*
Offline Offline

Posts: 1715069095

View Profile Personal Message (Offline)

Ignore
1715069095
Reply with quote  #2

1715069095
Report to moderator
1715069095
Hero Member
*
Offline Offline

Posts: 1715069095

View Profile Personal Message (Offline)

Ignore
1715069095
Reply with quote  #2

1715069095
Report to moderator
You get merit points when someone likes your post enough to give you some. And for every 2 merit points you receive, you can send 1 merit point to someone else!
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
grue
Legendary
*
Offline Offline

Activity: 2058
Merit: 1431



View Profile
December 17, 2013, 02:08:44 AM
 #2

Title: Japanese researchers break 41 out of 64 steps of SHA256 with preimage attack.
Abstract: In this paper, we propose preimage attacks [...]

sensationalist 6/10

It is pitch black. You are likely to be eaten by a grue.

Adblock for annoying signature ads | Enhanced Merit UI
betyourbits
Newbie
*
Offline Offline

Activity: 28
Merit: 0


View Profile WWW
December 17, 2013, 02:10:32 AM
 #3

Kind of interesting even if it is sensationalist.  Something like this might happen at some point and ruin bitcoin in the future.  Maybe we should update to sha512 or 1024 bits or something.
TheoryOfBitcoin (OP)
Newbie
*
Offline Offline

Activity: 38
Merit: 0


View Profile
December 17, 2013, 02:11:47 AM
 #4

Title: Japanese researchers break 41 out of 64 steps of SHA256 with preimage attack.
Abstract: In this paper, we propose preimage attacks [...]

sensationalist 6/10
Do you not understand all scientific papers use propose?

Propose as in "You can do it this way that we discovered"

Not propose as in "We think"
coastermonger
Sr. Member
****
Offline Offline

Activity: 367
Merit: 250

Find me at Bitrated


View Profile
December 17, 2013, 02:20:29 AM
 #5

Don't tell me you're drawing conclusions from an article just by reading it's title and abstract.  That's an absolute scientific no-no.

Link to full article: http://citeseerx.ist.psu.edu/viewdoc/download?rep=rep1&type=pdf&doi=10.1.1.215.5017

Bitrated user: Rees.
LAMarcellus
Full Member
***
Offline Offline

Activity: 180
Merit: 100


View Profile
December 17, 2013, 02:23:38 AM
 #6

I can use Vanity Gen to match 8 out of 32 letters in under 12 hours. 9 letters takes 2 days.  10 letters takes 4 months. 11 letters takes 2 years. 12 letters takes 10 years. 13 letters takes.....
Steps 1-41 is not 2/3rds.  Steps 1-41 are the easiest. They can't get past 42. And 43 will be doubly difficult as 42 was.   Step 42-64 take orders of magnitude longer to crack than 1-41 did.  They got the first 10 years worth done. Now the nheed to get the next 2 billion worth done, in steps 42-64.

The only way to deal with an unfree world is to become so absolutely free that your very existence is an act of rebellion. – Albert Camus
Piper67
Legendary
*
Offline Offline

Activity: 1106
Merit: 1001



View Profile
December 17, 2013, 02:28:33 AM
 #7

I can use Vanity Gen to match 8 out of 32 letters in under 12 hours. 9 letters takes 2 days.  10 letters takes 4 months. 11 letters takes 2 years. 12 letters takes 10 years. 13 letters takes.....
Steps 1-41 is not 2/3rds.  Steps 1-41 are the easiest. They can't get past 42. And 43 will be doubly difficult as 42 was.   Step 42-64 take orders of magnitude longer to crack than 1-41 did.  They got the first 10 years worth done. Now the nheed to get the next 2 billion worth done, in steps 42-64.


The exponential function is a bitch,misn't it?  Grin
r3wt
Hero Member
*****
Offline Offline

Activity: 686
Merit: 504


always the student, never the master.


View Profile
December 17, 2013, 02:32:39 AM
 #8

I can use Vanity Gen to match 8 out of 32 letters in under 12 hours. 9 letters takes 2 days.  10 letters takes 4 months. 11 letters takes 2 years. 12 letters takes 10 years. 13 letters takes.....
Steps 1-41 is not 2/3rds.  Steps 1-41 are the easiest. They can't get past 42. And 43 will be doubly difficult as 42 was.   Step 42-64 take orders of magnitude longer to crack than 1-41 did.  They got the first 10 years worth done. Now the nheed to get the next 2 billion worth done, in steps 42-64.


The exponential function is a bitch,misn't it?  Grin
exactly why its there.

My negative trust rating is reflective of a personal vendetta by someone on default trust.
pand70
Sr. Member
****
Offline Offline

Activity: 476
Merit: 250



View Profile
December 17, 2013, 02:43:55 AM
 #9

Title: Japanese researchers break 41 out of 64 steps of SHA256 with preimage attack.
Abstract: In this paper, we propose preimage attacks [...]

sensationalist 6/10
Do you not understand all scientific papers use propose?

Propose as in "You can do it this way that we discovered"

Not propose as in "We think"

I think he means that you should evaluate the actual preimage attack that they propose before saying that they broke it.
I mean i can propose an attack: Search for all the possible keys one by one... This is a nice theoretical attack but has no value in the real world...

Nancarrow
Hero Member
*****
Offline Offline

Activity: 492
Merit: 500


View Profile
December 17, 2013, 06:22:30 AM
 #10

Yawn. I've had the pdf of that paper on my laptop for a couple of years now. Keep rereading, trying to figure out what it's actually saying, every so often. Fascinating stuff but it's hardly 'breaking' SHA256, or even 41 out of 64 rounds of it.

If I understand correctly, they show how collisions can be found on their 'reduced' form of SHA256, in an amount of time that's only a fraction of brute-force time - they shave off a few powers of two, but still a huuuuuuge amount of time. There's an extension of this technique by Jian Guo and Krystian Matusiewicz, which must be downloadable from somewhere as I've got that on my HD too.

If I've said anything amusing and/or informative and you're feeling generous:
1GNJq39NYtf7cn2QFZZuP5vmC1mTs63rEW
empoweoqwj
Hero Member
*****
Offline Offline

Activity: 518
Merit: 500


View Profile
December 17, 2013, 09:57:02 AM
 #11

When the title reads "break 64 out of 64 steps" we need to be upgrade. 41 just isn't relevant.
prezbo
Sr. Member
****
Offline Offline

Activity: 430
Merit: 250


View Profile
December 17, 2013, 10:05:32 AM
 #12

they will be able to double spend transactions

No, they won't.

If I understand correctly, they show how collisions can be found on their 'reduced' form of SHA256, in an amount of time that's only a fraction of brute-force time - they shave off a few powers of two, but still a huuuuuuge amount of time. There's an extension of this technique by Jian Guo and Krystian Matusiewicz, which must be downloadable from somewhere as I've got that on my HD too.

Exactly.
BitThink
Legendary
*
Offline Offline

Activity: 882
Merit: 1000



View Profile
December 17, 2013, 10:23:45 AM
 #13

This affects Bitcoin massively because bitcoin uses SHA256 hashes for transaction IDs and blocks. A preimage attack is when you can find a value that has a specific hash value. For example, when researchers break the full 64 steps of SHA256, they will be able to double spend transactions and mine blocks near infinitely fast.

Here is the paper http://www.scholr.ly/paper/2078146/preimage-attacks-on-41-step-sha-256-and-46-step-sha-512

First, the distance between 41 steps to 64 steps are huge enough to say its useless to break the first 41 steps.

Second, mining is not to find an arbitrary input value to satisfy a specific hash value. In mining, some parts of the input value are determined and the hash value is not determined (it just needs to be smaller than a certain value). The probability for the value you found happens to include the correct block header is almost zero. Therefore, I don't think preimage attack will affect mining speed that much.
Come-from-Beyond
Legendary
*
Offline Offline

Activity: 2142
Merit: 1009

Newbie


View Profile
December 17, 2013, 10:26:47 AM
 #14

they will be able to double spend transactions

No, they won't.

Yes, they will.
Honeypot
Sr. Member
****
Offline Offline

Activity: 420
Merit: 250


View Profile
December 17, 2013, 10:54:10 AM
 #15

Who wants to bet NSA already holds this card close and is waiting to spring it once crypto gets out of control?
darlings
Full Member
***
Offline Offline

Activity: 134
Merit: 100


View Profile
December 17, 2013, 11:06:36 AM
 #16

so mean they can cheat with bitcoin ?
Kazimir
Legendary
*
Offline Offline

Activity: 1176
Merit: 1001



View Profile
December 17, 2013, 02:06:41 PM
 #17

they will be able to double spend transactions

No, they won't.

Yes, they will.
No, they won't. If you think otherwise, please elaborate (because it's false).

In theory, there's no difference between theory and practice. In practice, there is.
Insert coin(s): 1KazimirL9MNcnFnoosGrEkmMsbYLxPPob
Kazimir
Legendary
*
Offline Offline

Activity: 1176
Merit: 1001



View Profile
December 17, 2013, 02:08:40 PM
 #18

1. This does NOT imply SHA256 is broken or less secure in any way.
2. Luckily, Bitcoin uses Double SHA256. No problem whatsoever.

If somebody would break all 64 rounds of SHA256 (which is still lightyears away) we'll still have plenty of time to switch Bitcoin to SHA3.

Oh, and
3. If SHA256 would be broken, unlike Bitcoin most security protocols for other financial ecosystems will be in serious trouble. So this purely theoretical scenario would actually be reason to heavily switch towards Bitcoin, rather than away.

In theory, there's no difference between theory and practice. In practice, there is.
Insert coin(s): 1KazimirL9MNcnFnoosGrEkmMsbYLxPPob
Gabi
Legendary
*
Offline Offline

Activity: 1148
Merit: 1008


If you want to walk on water, get out of the boat


View Profile
December 17, 2013, 02:26:46 PM
 #19

Quote
SHA3
Do you guys trust it?

jarhed
Sr. Member
****
Offline Offline

Activity: 672
Merit: 254


View Profile
December 17, 2013, 02:34:01 PM
 #20

Guys, way off topic here.......

So far an interesting read....the thread that is. That vanity-gen post was an eye opener.


Edit:
I can use Vanity Gen to match 8 out of 32 letters in under 12 hours. 9 letters takes 2 days.  10 letters takes 4 months. 11 letters takes 2 years. 12 letters takes 10 years. 13 letters takes.....
Steps 1-41 is not 2/3rds.  Steps 1-41 are the easiest. They can't get past 42. And 43 will be doubly difficult as 42 was.   Step 42-64 take orders of magnitude longer to crack than 1-41 did.  They got the first 10 years worth done. Now the nheed to get the next 2 billion worth done, in steps 42-64.

Pages: [1] 2 3 4 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!