Bitcoin Forum
May 04, 2024, 08:15:22 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: bruteforcing sha256 (ed: not really it turns out, ty for not raping me too much)  (Read 1197 times)
chromeguy (OP)
Newbie
*
Offline Offline

Activity: 28
Merit: 0



View Profile WWW
January 09, 2012, 12:55:34 PM
Last edit: January 09, 2012, 06:16:55 PM by chromeguy
 #1

essentially, isn't this what mining does?
we do all the hard work, save the results - eventually every single hash will be decrypted & linked to its digest...

sha256 security? getting less by the hash
"I'm sure that in 20 years there will either be very large transaction volume or no volume." -- Satoshi
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714810522
Hero Member
*
Offline Offline

Posts: 1714810522

View Profile Personal Message (Offline)

Ignore
1714810522
Reply with quote  #2

1714810522
Report to moderator
realnowhereman
Hero Member
*****
Offline Offline

Activity: 504
Merit: 502



View Profile
January 09, 2012, 01:18:25 PM
 #2

we do all the hard work, save the results - eventually every single hash will be decrypted & linked to its digest...

I have no idea what you mean.  A hash is a digest.  A hash can't be "decrypted".

The attack against a hashing algorithm is to, say, have a target hash, and be able to find an input text that produces that hash without brute forcing.

Mining, on the other hand, is brute forcing the hash.  Or rather a range of hashes; we have a set of allowable target hashes and the input text is adjusted (via the nonce) until the input produces one of the target hashes.  Each potential input has to be tried though, there is no short cut.

The next text is a brand new block; in what way does knowledge of the previous brute forcings help you short cut your search for the next one?

I suppose the blocks do record particular outputs, of the 115792089237316195423570985008687907853269984665640564039457584007913129639936 possible sha256 values, 156 thousand ish blocks permanently record outputs for particular inputs.  How does that help with an attack?  156khashes can be calculated in less than a second.

1AAZ4xBHbiCr96nsZJ8jtPkSzsg1CqhwDa
Gabi
Legendary
*
Offline Offline

Activity: 1148
Merit: 1008


If you want to walk on water, get out of the boat


View Profile
January 09, 2012, 02:12:37 PM
 #3

essentially, isn't this what mining does?
we do all the hard work, save the results - eventually every single hash will be decrypted & linked to its digest...

sha256 security? getting less by the hash
No.

DeathAndTaxes
Donator
Legendary
*
Offline Offline

Activity: 1218
Merit: 1079


Gerald Davis


View Profile
January 09, 2012, 02:19:31 PM
Last edit: January 09, 2012, 07:34:32 PM by DeathAndTaxes
 #4

essentially, isn't this what mining does?
we do all the hard work, save the results - eventually every single hash will be decrypted & linked to its digest...

sha256 security? getting less by the hash

First of all a couple points.

1) We don't save all the work.  We discard about 99.9999999999999999999999999999999999999999% of the work.

2) Even if we saved some work the hashes only provide a lookup for the source (plaintext).  Have you looked at what we hash?  Not very useful outside bitcoin

3) There are 2^256 potential hashes.  The network is ~9TH.  Lets pretend it has been 9TH since the begining.  Since the start of bitcoin we have hashed (and thrown away but lets just pretend we didn't thrown all those hashes away) 5.67648E+20 hashes.

That is 1 in 1/203,985,725,726,711,000,000,000,000,000,000,000,000,000,000,000,000,000,000 of the potential hashes in SHA-256.

If the hashrate was 1000x higher (9 petahashes) and we hashed for the next milenium and saved all those hashes and constructed a high efficiency lookup table we would have roughly 1 in 1/ 407,971,451,453,423,000,000,000,000,000,000,000,000,000,000,000,000 of the SHA-256 space cataloged.

Smiley

2^256 is a much (by magnitudes) larger number than you think it is.  However large conceptually you think it is take that and square it and you likely still aren't close.

 
DeathAndTaxes
Donator
Legendary
*
Offline Offline

Activity: 1218
Merit: 1079


Gerald Davis


View Profile
January 09, 2012, 02:19:55 PM
 #5

No.

I should have just gone with that answer.
chromeguy (OP)
Newbie
*
Offline Offline

Activity: 28
Merit: 0



View Profile WWW
January 09, 2012, 06:04:47 PM
 #6

thanks for the input guys, a bit more detailed than the "yeah your probably right" answers i was getting from various chatrooms

more reading *sigh* Roll Eyes
ovidiusoft
Sr. Member
****
Offline Offline

Activity: 252
Merit: 250


View Profile
January 09, 2012, 11:52:43 PM
 #7

Also google "Rainbow Tables". It's been done for some algorithms, but their real-life usage is limited by the spread of multiple hashing, which would require exponential storage.
chromeguy (OP)
Newbie
*
Offline Offline

Activity: 28
Merit: 0



View Profile WWW
January 10, 2012, 01:50:36 AM
 #8

Also google "Rainbow Tables". It's been done for some algorithms, but their real-life usage is limited by the spread of multiple hashing, which would require exponential storage.
ahh, wpa cracking Smiley my friend successfully cracked his own wifi (testing obv.) only took 4hrs
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!