TG Telegram Group & Channel
LibreCryptography | United States America (US)
Create: Update:

*Potential Issues With SHA256 Hashing*

1. Bitcoin uses SHA256, which has created an inherent problem in using SHA256 for password hashing because there is now a thriving ecosystem (worth billions of dollars) of organizations that have developed advanced silicon chips and "ASIC" miners that are designed with the sole intention hashing SHA256 as quickly & efficiently as possible

a. proof #1 (link from Bloomberg detailing how Bitmain's valuation was north of $15 billion at one point in time = https://www.bloomberg.com/news/articles/2019-06-21/bitmain-is-said-to-revive-ipo-plan-as-bitcoin-hits-one-year-high ; Bitmain is a Bitcoin mining company)

b. proof #2 (link from Bloomberg detailing Canaan's $90 million IPO last year = https://www.bloomberg.com/news/articles/2019-11-21/bitcoin-mining-company-canaan-raises-90-million-in-u-s-ipo ; they are yet another Bitcoin mining firm)

c. live video showing an actual Bitcoin mining facility (one of many) = https://www.youtube.com/watch?v=Ri5djo3EOGI

2. SHA256 can be compromised via length extension attacks / malleability issues / side channel timing attacks
a. reference #1 ; (research paper detailing side channel attacks against SHA256 = https://ieeexplore.ieee.org/document/8210596 )
b. reference #2 ; (detailed answer exploring the issue of malleability in sha256 = https://crypto.stackexchange.com/questions/1801/what-type-of-hash-functions-provides-non-malleability-of-hash-digests )
c. reference #3 ; (detailed report explaining how length extension attacks are carried out against sha256 = https://blog.skullsecurity.org/2012/everything-you-need-to-know-about-hash-length-extension-attacks)

3. The NSA created SHA256

4. The NSA then moved away from using SHA256

*Potential Issues With SHA256 Hashing*

1. Bitcoin uses SHA256, which has created an inherent problem in using SHA256 for password hashing because there is now a thriving ecosystem (worth billions of dollars) of organizations that have developed advanced silicon chips and "ASIC" miners that are designed with the sole intention hashing SHA256 as quickly & efficiently as possible

a. proof #1 (link from Bloomberg detailing how Bitmain's valuation was north of $15 billion at one point in time = https://www.bloomberg.com/news/articles/2019-06-21/bitmain-is-said-to-revive-ipo-plan-as-bitcoin-hits-one-year-high ; Bitmain is a Bitcoin mining company)

b. proof #2 (link from Bloomberg detailing Canaan's $90 million IPO last year = https://www.bloomberg.com/news/articles/2019-11-21/bitcoin-mining-company-canaan-raises-90-million-in-u-s-ipo ; they are yet another Bitcoin mining firm)

c. live video showing an actual Bitcoin mining facility (one of many) = https://www.youtube.com/watch?v=Ri5djo3EOGI

2. SHA256 can be compromised via length extension attacks / malleability issues / side channel timing attacks
a. reference #1 ; (research paper detailing side channel attacks against SHA256 = https://ieeexplore.ieee.org/document/8210596 )
b. reference #2 ; (detailed answer exploring the issue of malleability in sha256 = https://crypto.stackexchange.com/questions/1801/what-type-of-hash-functions-provides-non-malleability-of-hash-digests )
c. reference #3 ; (detailed report explaining how length extension attacks are carried out against sha256 = https://blog.skullsecurity.org/2012/everything-you-need-to-know-about-hash-length-extension-attacks)

3. The NSA created SHA256

4. The NSA then moved away from using SHA256


>>Click here to continue<<

LibreCryptography






Share with your best friend
VIEW MORE

United States America Popular Telegram Group (US)