Bitcoin Forum
September 17, 2021, 01:32:29 PM *
News: Latest Bitcoin Core release: 22.0 [Torrent]
   Home   Help Search Login Register More  
Pages: [1]
Author Topic: Future : Effect of mining on use of SHA-2 in general ... (Scenario for 2014 & +)  (Read 1192 times)
Offline Offline

Activity: 1731
Merit: 1001

View Profile WWW
July 03, 2012, 05:39:13 PM
Last edit: July 03, 2012, 06:26:15 PM by Transisto

How and when will the industries using SHA-2 for securing sensitive data will feel compelled to change algorithm because of mining hardware manufacturing ?

The current generation of BFL ASICs may not be of any use for cracking password but future ASICs products will want to take advantage of it's ease or implementation, increasing profits and lessening risks.  See :

Back in the days it used to be secure to use 9+ character passwords for securing a WiFi AP,,, now 12 is the norm.
I fear that eventually people willing to use a password they can remember will not be able to do so with anything sha2 secured.

  • SHA-2 is the world most trusted secure algorithm.
  • Some devices have sha1-2 embedded in hardware, as is the case in many routers / vpn.

(might be related) : Cryptanalysis of AES and SHA-2: how far we are from compromising worldwide encryption and hashing standards
Pages: [1]
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!