Bitcoin Forum
December 07, 2016, 08:41:38 AM *
News: To be able to use the next phase of the beta forum software, please ensure that your email address is correct/functional.
 
   Home   Help Search Donate Login Register  
Pages: « 1 [2]  All
  Print  
Author Topic: SHA-256 as a boolean function  (Read 10151 times)
jake262144
Full Member
***
Offline Offline

Activity: 210


View Profile
January 08, 2012, 06:14:17 PM
 #21

I think something like this http://hashcat.net/wiki/mask_attack would be more reasonable/realistic. It used to take me 6 hours to brute force a WPA PSK of 8 digits, now I can do it in under 30 minutes.

Let's quote from the page you're linking to: In Mask attack we know about humans and how they design passwords.

Mask attack is NO BETTER than a traditional brute-force attack. You're breaking your own (I sure hope so) WPA key faster only because it's a shitty key.
Attempting to break a sufficiently random passphrase, like RU8wNkg4R2uTQ0tAx will only mean that you'll have to try most of the possible passphrase-space.

I regret to say, the example you posted (breaking a dictionary-based WPA passphrase) is completely orthogonal to bitcoin mining.
1481100098
Hero Member
*
Offline Offline

Posts: 1481100098

View Profile Personal Message (Offline)

Ignore
1481100098
Reply with quote  #2

1481100098
Report to moderator
1481100098
Hero Member
*
Offline Offline

Posts: 1481100098

View Profile Personal Message (Offline)

Ignore
1481100098
Reply with quote  #2

1481100098
Report to moderator
1481100098
Hero Member
*
Offline Offline

Posts: 1481100098

View Profile Personal Message (Offline)

Ignore
1481100098
Reply with quote  #2

1481100098
Report to moderator
"Your bitcoin is secured in a way that is physically impossible for others to access, no matter for what reason, no matter how good the excuse, no matter a majority of miners, no matter what." -- gmaxwell
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
1481100098
Hero Member
*
Offline Offline

Posts: 1481100098

View Profile Personal Message (Offline)

Ignore
1481100098
Reply with quote  #2

1481100098
Report to moderator
Geremia
Sr. Member
****
Offline Offline

Activity: 445


View Profile WWW
April 30, 2013, 04:34:52 AM
 #22

Check out this.

BTC tip jar | my BTC wiki, BTC StackExchange, Twister posts, & Keybase pages | Tox ID: 65C3E8810738AD9D175234808FCB317A1103632903436203D45411AE97C03F547D390A76B3CF
Join Coinbase. | The best, free book on Bitcoin: Mastering Bitcoin
Nos cum prole pia benedicat Virgo Maria.
kokjo
Legendary
*
Offline Offline

Activity: 1050

You are WRONG!


View Profile
April 30, 2013, 07:53:27 AM
 #23

Check out this.
+1 this stuff is cool!

"The whole problem with the world is that fools and fanatics are always so certain of themselves and wiser people so full of doubts." -Bertrand Russell
Geremia
Sr. Member
****
Offline Offline

Activity: 445


View Profile WWW
April 30, 2013, 04:03:39 PM
 #24

Yes, it's certainly interesting, but computationally it appears it can be no more efficient than brute force…
Also, if it does work better than even ASIC brute-force devices, it wouldn't adversely affect Bitcoin, even if Bitcoin doesn't have a contingency plan for partially-breaking SHA-256 yet.

BTC tip jar | my BTC wiki, BTC StackExchange, Twister posts, & Keybase pages | Tox ID: 65C3E8810738AD9D175234808FCB317A1103632903436203D45411AE97C03F547D390A76B3CF
Join Coinbase. | The best, free book on Bitcoin: Mastering Bitcoin
Nos cum prole pia benedicat Virgo Maria.
Pages: « 1 [2]  All
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!