TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: Bitcoin Mining Operations Perpetuating Weaknesses in SHA-256?

3 点作者 nighthawk超过 11 年前
Is it possible that bitcoin mining operations are actually generating the analog of a giant rainbow table to aid in the decryption of SHA-256 data?<p>Perhaps some mechanism that would facilitate a birthday attack, collisions, etc.?<p>I thought I&#x27;d float this out there to people who know more about cryptography and the weaknesses of these algorithms than I do.

3 条评论

tptacek超过 11 年前
Unlike SHA-1, which has a 2^60 local-collision attack and a 160 bit output (so an 80 bit birthday bound), SHA-2 has no theoretical attacks and a 128 bit security bound.<p>You can do the math on how much it would cost to find a SHA-2 collision; for instance, you can steal Skein team member Jesse Walker&#x27;s back of the envelope calculations, assigning 2^61 cycles and 2^8 dollars to a server-year. Now multiply the number of cycles a block of SHA256 takes by 2^128.<p>I don&#x27;t think a direct attack on SHA256 is a productive use to put the world&#x27;s computers.
fleitz超过 11 年前
Rainbow tables are a space time tradeoff for specific known inputs, since the BTC blocks are not generally &#x27;known&#x27; nor do some blocks occur more frequently than others rainbow tables are useless. Even when passwords are merely salted rainbow tables are abandoned as not worth the time.<p>You could pregenerate a &#x27;longer&#x27; chain, but the problem is the &#x27;legnth&#x27; of the chain is calculated based on difficulty not number of blocks, so you&#x27;d need more computer power than all miners combined.<p>If you want to get cynical about US &#x2F; Chinese approval for BTC it would probably be willingness to buy enough hardware to precompute a longer chain.<p>The algos to exploit are the RNGs used in the ECDSA portion of BTC which allow you to derive the private key and directly spend bitcoins, there aren&#x27;t any currently known weaknesses in relation to SHA256 in BTC. The RNG issue is specific to certain implemenations of BTC and has nothing to do with the protocol itself. (Similar to how an exploit for apache is not a weakness in HTTP)
评论 #6760376 未加载
oleganza超过 11 年前
Miners are computing hashes for a very specific chunk of data. And it&#x27;s also double SHA256 which is not used in any standard key-derivation function. Specialized mining machines implement a lot of shortcuts to optimise for that exact hashing (in silicon!) and are useless for anything except Bitcoin mining.