Bitcoin Forum
June 23, 2024, 03:04:25 AM *
News: Voting for pizza day contest
 
   Home   Help Search Login Register More  
Pages: « 1 [2] 3 »  All
  Print  
Author Topic: Can coins be destroyed in a more 'polite' way?  (Read 4120 times)
benjamin07
Full Member
***
Offline Offline

Activity: 223
Merit: 116


View Profile
March 14, 2014, 08:22:41 AM
 #21

There is no actual way of "destroying coins". Even sending to an address with a private key that isn't known, a person can also get a lot (and i mean a real lot) amount of hashpower to bruteforce the key. Although it would be difficult, the coins are still recoverable.

No they are not.




Hi if that picture is true then can someone please she'd some light for example on why a stupid thing such as a remotely managed electric car battery charger is running SHA-1024? Thanks, btw they used to run SHA-256 before...
kjj
Legendary
*
Offline Offline

Activity: 1302
Merit: 1025



View Profile
March 14, 2014, 10:56:13 AM
 #22

Hi if that picture is true then can someone please she'd some light for example on why a stupid thing such as a remotely managed electric car battery charger is running SHA-1024? Thanks, btw they used to run SHA-256 before...

There is no SHA-1024.

http://en.wikipedia.org/wiki/SHA-2

17Np17BSrpnHCZ2pgtiMNnhjnsWJ2TMqq8
I routinely ignore posters with paid advertising in their sigs.  You should too.
Trongersoll
Hero Member
*****
Offline Offline

Activity: 490
Merit: 501



View Profile
March 14, 2014, 08:00:44 PM
 #23

Want to effectively destroy your bitcoins?
  • make a wallet with no backup copy
  • store coins in it
  • reformat disk

a bit extreme, Shocked i know.
benjamin07
Full Member
***
Offline Offline

Activity: 223
Merit: 116


View Profile
March 15, 2014, 04:36:38 AM
 #24

Hi if that picture is true then can someone please she'd some light for example on why a stupid thing such as a remotely managed electric car battery charger is running SHA-1024? Thanks, btw they used to run SHA-256 before...

There is no SHA-1024.

http://en.wikipedia.org/wiki/SHA-2
Wikipedia is full of mistakes. I am sure there is SHA-1024 product coming out, the guy is making the hardware and applying for license...

Also, the strange thing is that Bitcoin was said to have started in 2009, but that page says SHA-2 was 2011ish...

All besides the point, point being why would anyone use SHA-512 then if SHA-256 is impossible to break in this time and space?
Light
Hero Member
*****
Offline Offline

Activity: 742
Merit: 502


Circa 2010


View Profile
March 15, 2014, 04:51:22 AM
 #25

No they are not.

[infographic]

While, your overly used infographic is correct in saying that it would be impossible to check all of the keyspace, it doesn't necessarily mean it's impossible for someone to bruteforce a private key. It may be extremely and ridiculously unlikely but there is still the minutest chance that one can be found via bruteforcing. But for all intents and purposes that probability is so low that we just like to say its impossible because it sounds better.
DeathAndTaxes
Donator
Legendary
*
Offline Offline

Activity: 1218
Merit: 1079


Gerald Davis


View Profile
March 15, 2014, 05:09:46 AM
 #26

No they are not.

[infographic]

While, your overly used infographic is correct in saying that it would be impossible to check all of the keyspace, it doesn't necessarily mean it's impossible for someone to bruteforce a private key. It may be extremely and ridiculously unlikely but there is still the minutest chance that one can be found via bruteforcing. But for all intents and purposes that probability is so low that we just like to say its impossible because it sounds better.

The term is infeasible.  Then again just about anything which most people consider is impossible is simply low probability.   Trying running directly into a wall.  There is a non zero percent chance that due to quantum effect you will pass right through it.
ns12123
Newbie
*
Offline Offline

Activity: 14
Merit: 0


View Profile
March 15, 2014, 11:59:23 PM
 #27

Why to destroy ?
Remember remember the 5th of November
Legendary
*
Offline Offline

Activity: 1862
Merit: 1011

Reverse engineer from time to time


View Profile
March 16, 2014, 12:01:20 AM
 #28

Hi if that picture is true then can someone please she'd some light for example on why a stupid thing such as a remotely managed electric car battery charger is running SHA-1024? Thanks, btw they used to run SHA-256 before...

There is no SHA-1024.

http://en.wikipedia.org/wiki/SHA-2
Wikipedia is full of mistakes. I am sure there is SHA-1024 product coming out, the guy is making the hardware and applying for license...

Also, the strange thing is that Bitcoin was said to have started in 2009, but that page says SHA-2 was 2011ish...

All besides the point, point being why would anyone use SHA-512 then if SHA-256 is impossible to break in this time and space?
You aren't reading

"SHA-2 is a set of cryptographic hash functions (SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256) designed by the U.S. National Security Agency (NSA) and published in 2001"

BTC:1AiCRMxgf1ptVQwx6hDuKMu4f7F27QmJC2
Light
Hero Member
*****
Offline Offline

Activity: 742
Merit: 502


Circa 2010


View Profile
March 16, 2014, 12:05:33 AM
 #29

The term is infeasible.  Then again just about anything which most people consider is impossible is simply low probability.   Trying running directly into a wall.  There is a non zero percent chance that due to quantum effect you will pass right through it.

Thanks, I was searching for it but I was coming up with a mental blank. I'm just really nitpicky about when people say something is completely impossible to do, when in fact there is just a ridiculously low probability (as to me there is a difference).
Syke
Legendary
*
Offline Offline

Activity: 3878
Merit: 1193


View Profile
March 16, 2014, 01:44:18 AM
 #30

All besides the point, point being why would anyone use SHA-512 then if SHA-256 is impossible to break in this time and space?

There are algorithms "stronger" than sha-256, not because sha-256 is brute-forceable, but because there is may be an undiscovered weakness.

Buy & Hold
qwertyqwerty
Full Member
***
Offline Offline

Activity: 202
Merit: 100



View Profile
March 16, 2014, 01:46:04 AM
 #31

Wouldn't sending those coins as a(possibly huge) fee be a better approach? That way, those coins get back to the miners and not sent into oblivion to a valid, but onowned, address.

That wouldn't be destroyed.

There is no actual way of "destroying coins". Even sending to an address with a private key that isn't known, a person can also get a lot (and i mean a real lot) amount of hashpower to bruteforce the key. Although it would be difficult, the coins are still recoverable.

no, not really. what deathandtaxes said still applies. it's computationally unfeasible to the point that it's hard to comprehend.
DeathAndTaxes
Donator
Legendary
*
Offline Offline

Activity: 1218
Merit: 1079


Gerald Davis


View Profile
March 16, 2014, 03:30:15 AM
 #32

Hi if that picture is true then can someone please she'd some light for example on why a stupid thing such as a remotely managed electric car battery charger is running SHA-1024? Thanks, btw they used to run SHA-256 before...

There is no SHA-1024.

http://en.wikipedia.org/wiki/SHA-2
Wikipedia is full of mistakes. I am sure there is SHA-1024 product coming out, the guy is making the hardware and applying for license...

There is no 1024 bit version of SHA-2.  Either your friend is talking nonsense or you misunderstood him.  SHA-2 is no longer being developed.  SHA-3 is the intended replacement and it supports arbitrary hash sizes up to 512 bits. 

Quote
Why would anyone use SHA-512 then if SHA-256 is impossible to break in this time and space?

Not impossible to break, impossible to BRUTE FORCE.  Cryptanalysis may eventually weaken SHA-256 (and SHA-512) and performing a preimage attack may be faster than brute force.  Today no such flaws are known to exist for SHA-2 (all hash sizes) however the use of larger keys and hash sizes can be thought of as insurance.
Kazimir
Legendary
*
Offline Offline

Activity: 1176
Merit: 1003



View Profile
March 16, 2014, 06:29:01 PM
 #33

Wikipedia is full of mistakes. I am sure there is SHA-1024 product coming out, the guy is making the hardware and applying for license...
There is no SHA-1024. And if there was, it would have been open source and not requiring any license whatsoever.

Quote
All besides the point, point being why would anyone use SHA-512 then if SHA-256 is impossible to break in this time and space?
Because some day, someone smart may discover a mathematical weakness in SHA-256 and attacking it may become significantly more efficient than just brute forcing 2256 possibilities.

In theory, there's no difference between theory and practice. In practice, there is.
Insert coin(s): 1KazimirL9MNcnFnoosGrEkmMsbYLxPPob
Kazimir
Legendary
*
Offline Offline

Activity: 1176
Merit: 1003



View Profile
March 16, 2014, 06:38:02 PM
 #34

As for destroying coins, I'd say it's very likely (probability extremely close to 1) that there are valid addresses (i.e. correctly formatted) that are not the RIPEMD160(SHA256(..)) hash of any possible public key. Or only of apparent public keys (that is x,y coordinates) that actually do not correspond to any possible private key.

Sending coins to such addresses would most definitely destroy the coins forever. There is simply nothing to brute force, even if you had a quantum computer the size of the universe and infinite energy at your disposal.

However it's again infeasible to determine if a randomly generated address is actually such a 'phantom' address Smiley

In theory, there's no difference between theory and practice. In practice, there is.
Insert coin(s): 1KazimirL9MNcnFnoosGrEkmMsbYLxPPob
Cryddit
Legendary
*
Offline Offline

Activity: 924
Merit: 1129


View Profile
March 19, 2014, 03:14:04 AM
 #35

I'm a lucky man.  My father, grandfather and great-grandfather were all hit by lightning, and I got born anyway.

I moved to a nice coastal area where lightning storms are less common, so as not to continue that tradition, btw.  I also don't fix barbed wire fences when storms are moving in, nor ride iron-shod horses across wet high-altitude flatland during a storm, nor....  well, whatever.

With luck like that, I might one day consider buying a lottery ticket. 

But I wouldn't attempt to brute-force a Bitcoin key.  That's just crazy.

dewdeded
Legendary
*
Offline Offline

Activity: 1232
Merit: 1011


Monero Evangelist


View Profile
March 19, 2014, 10:34:38 AM
 #36

"Bitcoin, we need to talk. It's not you, it's me. We need to take a break and see other people. Excuse me, I have a date with Litecoin."
Is it easier to destroy Litecoins?
Rannasha
Hero Member
*****
Offline Offline

Activity: 728
Merit: 500


View Profile
March 19, 2014, 10:44:01 AM
 #37

"Bitcoin, we need to talk. It's not you, it's me. We need to take a break and see other people. Excuse me, I have a date with Litecoin."
Is it easier to destroy Litecoins?

Just as easy/hard. Litecoin is almost a complete clone of Bitcoin.
jamd315
Newbie
*
Offline Offline

Activity: 7
Merit: 0


View Profile
March 21, 2014, 02:38:18 AM
 #38

Would printing a paper wallet and then burning it work?
activebiz
Hero Member
*****
Offline Offline

Activity: 518
Merit: 500


View Profile
March 21, 2014, 02:35:38 PM
 #39

Why destroy bitcoins. So many newbies would be more tham grateful to recieve them, unless ur destroying them to create something else.

DobZombie
Hero Member
*****
Offline Offline

Activity: 896
Merit: 532


Former curator of The Bitcoin Museum


View Profile
March 21, 2014, 02:47:38 PM
 #40

I know that none of the 50 coins generated in The Genesis Block can be spent, but what about other coins sent to that address? can they ever be spent?

Tip Me if believe BTC1 will hit $1 Million by 2030
1DobZomBiE2gngvy6zDFKY5b76yvDbqRra
Pages: « 1 [2] 3 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!