What i meant, there is cases where at certain situation a certain outcome is certain to 100%.
Expanding THOSE lookups where we know that something will result into something 100% of the time is my intention.
No such scenarios exist beyond the current ones.
Let's say beginning of the hash is e5da3, and for some statistical miraculous reason if char[0] == e, char[3]==d, char[5] == 3 then char[6] == a when we know that what we are hashing is N characters long.
Or maybe if the beginning of hash is 6be3c118da8acd56 we know the last character is 5, thus cannot be our match.
Or maybe if the first round beginning is 6be3c118da8acd56 we know that next round first 3 chars will be dcc, and therefore not a match.
Pending statistical analysis naturally.
I hate to break it to you but no modern cipher can be broken that easily. Hell no cipher of 1960s could be broken that easily. There is no prefix, suffix, middle charecter, or other recognizable element of a block header which produces too large of a block hash. If there was then SHA-256 would be broken.
I don't understand why that kind of statistical analysis is so difficult to fathom.
Similar things ARE being done with FPGAs, and probably on the GPU code.
No they aren't. That would be a round reduction attack and no know general purpose round reduction attack exists for SHA-256. The entire cryptographic community has been looking over round reductions for the better part of a decade. If you think you will find one via some statistical analysis of a trillion or so hashes well start looking into it but before you waste your time look at the psuedo code of SHA-256 round computation.
Specifically the Ch function. Notice also how elements A to H rotate after each round.
Cryptographically strong hashes are designed to defeat specifically what you are looking to do. If you could do what you think you can do forget Bitcoin the implications go far beyond it. You would be a rockstar in cryptographic circles, and could likely write yourself a job opening in any of the 3 letter agencies you wanted. Then again the NSA spent nearly 4 years vetting algorithms, hosting open challenges to look for attacks and SHA-256 has been
THE target to hit among cryptographers so I think the odds of you stumbling accidentally on something that rips it wide open is limited.
Also, we know the format the original data is in, which might result in some odd coincidences in the resulting double hash.
SHA-256 has no know preimage attacks against the full strength cipher.
Still don't let this dissuade you. What you are describing is an attack, not an attack of Bitcoin but a credible attack against SHA-256.