TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: Bitcoin Mining Operations Perpetuating Weaknesses in SHA-256?

3 pointsby nighthawkover 11 years ago
Is it possible that bitcoin mining operations are actually generating the analog of a giant rainbow table to aid in the decryption of SHA-256 data?<p>Perhaps some mechanism that would facilitate a birthday attack, collisions, etc.?<p>I thought I&#x27;d float this out there to people who know more about cryptography and the weaknesses of these algorithms than I do.

3 comments

tptacekover 11 years ago
Unlike SHA-1, which has a 2^60 local-collision attack and a 160 bit output (so an 80 bit birthday bound), SHA-2 has no theoretical attacks and a 128 bit security bound.<p>You can do the math on how much it would cost to find a SHA-2 collision; for instance, you can steal Skein team member Jesse Walker&#x27;s back of the envelope calculations, assigning 2^61 cycles and 2^8 dollars to a server-year. Now multiply the number of cycles a block of SHA256 takes by 2^128.<p>I don&#x27;t think a direct attack on SHA256 is a productive use to put the world&#x27;s computers.
fleitzover 11 years ago
Rainbow tables are a space time tradeoff for specific known inputs, since the BTC blocks are not generally &#x27;known&#x27; nor do some blocks occur more frequently than others rainbow tables are useless. Even when passwords are merely salted rainbow tables are abandoned as not worth the time.<p>You could pregenerate a &#x27;longer&#x27; chain, but the problem is the &#x27;legnth&#x27; of the chain is calculated based on difficulty not number of blocks, so you&#x27;d need more computer power than all miners combined.<p>If you want to get cynical about US &#x2F; Chinese approval for BTC it would probably be willingness to buy enough hardware to precompute a longer chain.<p>The algos to exploit are the RNGs used in the ECDSA portion of BTC which allow you to derive the private key and directly spend bitcoins, there aren&#x27;t any currently known weaknesses in relation to SHA256 in BTC. The RNG issue is specific to certain implemenations of BTC and has nothing to do with the protocol itself. (Similar to how an exploit for apache is not a weakness in HTTP)
评论 #6760376 未加载
oleganzaover 11 years ago
Miners are computing hashes for a very specific chunk of data. And it&#x27;s also double SHA256 which is not used in any standard key-derivation function. Specialized mining machines implement a lot of shortcuts to optimise for that exact hashing (in silicon!) and are useless for anything except Bitcoin mining.