Nice. Incidentally, similar techniques are often used in security breaches. I remember it both from the recent paper that guesses your SSN from you date of birth and other data (where it is used to extrapolate your SSN from those of dead people with a nearby date of birth), and in the recent paper on the rogue CA certificate, where it is used to guess the timestamp on the certificate to the exact second.<p>I highly recommend reading these two papers -- both attacks required a great deal of ingenuity to pull off, especially the second one.<p><a href="http://www.pnas.org/content/106/27/10975.full" rel="nofollow">http://www.pnas.org/content/106/27/10975.full</a><p><a href="http://www.win.tue.nl/hashclash/rogue-ca/" rel="nofollow">http://www.win.tue.nl/hashclash/rogue-ca/</a>