|
grue
Legendary
Offline
Activity: 2058
Merit: 1452
|
|
December 17, 2013, 02:08:44 AM |
|
Title: Japanese researchers break 41 out of 64 steps of SHA256 with preimage attack. Abstract: In this paper, we propose preimage attacks [...]
sensationalist 6/10
|
|
|
|
betyourbits
Newbie
Offline
Activity: 28
Merit: 0
|
|
December 17, 2013, 02:10:32 AM |
|
Kind of interesting even if it is sensationalist. Something like this might happen at some point and ruin bitcoin in the future. Maybe we should update to sha512 or 1024 bits or something.
|
|
|
|
TheoryOfBitcoin (OP)
Newbie
Offline
Activity: 38
Merit: 0
|
|
December 17, 2013, 02:11:47 AM |
|
Title: Japanese researchers break 41 out of 64 steps of SHA256 with preimage attack. Abstract: In this paper, we propose preimage attacks [...]
sensationalist 6/10
Do you not understand all scientific papers use propose? Propose as in "You can do it this way that we discovered" Not propose as in "We think"
|
|
|
|
|
LAMarcellus
|
|
December 17, 2013, 02:23:38 AM |
|
I can use Vanity Gen to match 8 out of 32 letters in under 12 hours. 9 letters takes 2 days. 10 letters takes 4 months. 11 letters takes 2 years. 12 letters takes 10 years. 13 letters takes..... Steps 1-41 is not 2/3rds. Steps 1-41 are the easiest. They can't get past 42. And 43 will be doubly difficult as 42 was. Step 42-64 take orders of magnitude longer to crack than 1-41 did. They got the first 10 years worth done. Now the nheed to get the next 2 billion worth done, in steps 42-64.
|
The only way to deal with an unfree world is to become so absolutely free that your very existence is an act of rebellion. – Albert Camus
|
|
|
Piper67
Legendary
Offline
Activity: 1106
Merit: 1001
|
|
December 17, 2013, 02:28:33 AM |
|
I can use Vanity Gen to match 8 out of 32 letters in under 12 hours. 9 letters takes 2 days. 10 letters takes 4 months. 11 letters takes 2 years. 12 letters takes 10 years. 13 letters takes..... Steps 1-41 is not 2/3rds. Steps 1-41 are the easiest. They can't get past 42. And 43 will be doubly difficult as 42 was. Step 42-64 take orders of magnitude longer to crack than 1-41 did. They got the first 10 years worth done. Now the nheed to get the next 2 billion worth done, in steps 42-64.
The exponential function is a bitch,misn't it?
|
|
|
|
r3wt
|
|
December 17, 2013, 02:32:39 AM |
|
I can use Vanity Gen to match 8 out of 32 letters in under 12 hours. 9 letters takes 2 days. 10 letters takes 4 months. 11 letters takes 2 years. 12 letters takes 10 years. 13 letters takes..... Steps 1-41 is not 2/3rds. Steps 1-41 are the easiest. They can't get past 42. And 43 will be doubly difficult as 42 was. Step 42-64 take orders of magnitude longer to crack than 1-41 did. They got the first 10 years worth done. Now the nheed to get the next 2 billion worth done, in steps 42-64.
The exponential function is a bitch,misn't it? exactly why its there.
|
My negative trust rating is reflective of a personal vendetta by someone on default trust.
|
|
|
pand70
|
|
December 17, 2013, 02:43:55 AM |
|
Title: Japanese researchers break 41 out of 64 steps of SHA256 with preimage attack. Abstract: In this paper, we propose preimage attacks [...]
sensationalist 6/10
Do you not understand all scientific papers use propose? Propose as in "You can do it this way that we discovered" Not propose as in "We think" I think he means that you should evaluate the actual preimage attack that they propose before saying that they broke it. I mean i can propose an attack: Search for all the possible keys one by one... This is a nice theoretical attack but has no value in the real world...
|
|
|
|
Nancarrow
|
|
December 17, 2013, 06:22:30 AM |
|
Yawn. I've had the pdf of that paper on my laptop for a couple of years now. Keep rereading, trying to figure out what it's actually saying, every so often. Fascinating stuff but it's hardly 'breaking' SHA256, or even 41 out of 64 rounds of it.
If I understand correctly, they show how collisions can be found on their 'reduced' form of SHA256, in an amount of time that's only a fraction of brute-force time - they shave off a few powers of two, but still a huuuuuuge amount of time. There's an extension of this technique by Jian Guo and Krystian Matusiewicz, which must be downloadable from somewhere as I've got that on my HD too.
|
If I've said anything amusing and/or informative and you're feeling generous: 1GNJq39NYtf7cn2QFZZuP5vmC1mTs63rEW
|
|
|
empoweoqwj
|
|
December 17, 2013, 09:57:02 AM |
|
When the title reads "break 64 out of 64 steps" we need to be upgrade. 41 just isn't relevant.
|
|
|
|
prezbo
|
|
December 17, 2013, 10:05:32 AM |
|
they will be able to double spend transactions
No, they won't. If I understand correctly, they show how collisions can be found on their 'reduced' form of SHA256, in an amount of time that's only a fraction of brute-force time - they shave off a few powers of two, but still a huuuuuuge amount of time. There's an extension of this technique by Jian Guo and Krystian Matusiewicz, which must be downloadable from somewhere as I've got that on my HD too.
Exactly.
|
|
|
|
BitThink
Legendary
Offline
Activity: 882
Merit: 1000
|
|
December 17, 2013, 10:23:45 AM |
|
First, the distance between 41 steps to 64 steps are huge enough to say its useless to break the first 41 steps. Second, mining is not to find an arbitrary input value to satisfy a specific hash value. In mining, some parts of the input value are determined and the hash value is not determined (it just needs to be smaller than a certain value). The probability for the value you found happens to include the correct block header is almost zero. Therefore, I don't think preimage attack will affect mining speed that much.
|
|
|
|
Come-from-Beyond
Legendary
Offline
Activity: 2142
Merit: 1010
Newbie
|
|
December 17, 2013, 10:26:47 AM |
|
they will be able to double spend transactions
No, they won't. Yes, they will.
|
|
|
|
Honeypot
|
|
December 17, 2013, 10:54:10 AM |
|
Who wants to bet NSA already holds this card close and is waiting to spring it once crypto gets out of control?
|
|
|
|
darlings
|
|
December 17, 2013, 11:06:36 AM |
|
so mean they can cheat with bitcoin ?
|
|
|
|
Kazimir
Legendary
Offline
Activity: 1176
Merit: 1011
|
|
December 17, 2013, 02:06:41 PM |
|
they will be able to double spend transactions
No, they won't. Yes, they will. No, they won't. If you think otherwise, please elaborate (because it's false).
|
|
|
|
Kazimir
Legendary
Offline
Activity: 1176
Merit: 1011
|
|
December 17, 2013, 02:08:40 PM |
|
1. This does NOT imply SHA256 is broken or less secure in any way. 2. Luckily, Bitcoin uses Double SHA256. No problem whatsoever.
If somebody would break all 64 rounds of SHA256 (which is still lightyears away) we'll still have plenty of time to switch Bitcoin to SHA3.
Oh, and 3. If SHA256 would be broken, unlike Bitcoin most security protocols for other financial ecosystems will be in serious trouble. So this purely theoretical scenario would actually be reason to heavily switch towards Bitcoin, rather than away.
|
|
|
|
Gabi
Legendary
Offline
Activity: 1148
Merit: 1008
If you want to walk on water, get out of the boat
|
|
December 17, 2013, 02:26:46 PM |
|
SHA3 Do you guys trust it?
|
|
|
|
jarhed
|
|
December 17, 2013, 02:34:01 PM |
|
Guys, way off topic here....... So far an interesting read....the thread that is. That vanity-gen post was an eye opener. Edit: I can use Vanity Gen to match 8 out of 32 letters in under 12 hours. 9 letters takes 2 days. 10 letters takes 4 months. 11 letters takes 2 years. 12 letters takes 10 years. 13 letters takes..... Steps 1-41 is not 2/3rds. Steps 1-41 are the easiest. They can't get past 42. And 43 will be doubly difficult as 42 was. Step 42-64 take orders of magnitude longer to crack than 1-41 did. They got the first 10 years worth done. Now the nheed to get the next 2 billion worth done, in steps 42-64.
|
|
|
|
|