No offense but you don't seem to be a very good listener. I'm telling you that a better place to search for vulnerabilities would be the elliptic curves used in Bitcoin. I believe those were used and/or created by agencies of the USA as well.
Thanks, actually I did learn a little searching that.
I don't know enough about this to even begin to search for vulnerabilities though. What I am able to look for though, and what anybody should be able to notice, is the following,
1) Someone using the pseudonym Satoshi Nakamoto developed a digital currency that used one of only three algorithm's approved by NIST
http://csrc.nist.gov/groups/ST/toolkit/digital_signatures.html from the only group of hashes approved by them
http://csrc.nist.gov/groups/ST/toolkit/secure_hashing.html . In other words that person steered bitcoin into American waters.
2) Before Snowden there were numerous questions raised, see previous links. Post Snowden it becomes almost bizarre that bitcoin, all things considered, would stand by the NSA.
3) The arguments defending that decision generally could be described more accurately as "excuses" rather than explanations. In other words even if I don't understand the arguments I can see that something is not quite right.
It is a known fact that ECDSA has been exploited because the people that implemented it did a poor job. Blockchain.info has BTC stolen because of broken values used for one of the value in calculating the signature. Rather, the part that truly affects Bitcoin is the random number generator that each implementation uses. ECDSA relies on diffidently random integers, and when the RNG is predictable, the cryptography can be broken. no-ice-please was actually right in asking about SHA-256 because the implementation of ECDSA used in the Bitcoin protocol used the standardized SHA-256 algorithm. The only other thing to focus on would be the RNG used, but that differs from OS to OS and wallet to wallet.
1) There are a few too many examples of poor implementation. Is it really likely that Blockchain.info, Sony and others were unable to properly use the algorithm? Sorry to be conspiracyish but considering the revisionism of md5 and so on, it's only another reason to be cautious.
2) Random number generators come up too often as a flaw. Someone should make a thermometer that measures temp to 50 decimal places and you can use the last 20 digits as random numbers.
3) I asked about sha2 because there is a heavy layer of bullshit surrounding its defense. It seems to only get thicker.
As far as conspiracy theories go, my understanding is that there are different curves and Satoshi chose a more obscure one with more transparent parameters.
"Satoshi" chose NSA all the way
https://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtmlWith all of the people involved in Bitcoin, it seems like there must be some who feel that caution with NSA products is prudent and who also have the ability to create an algorithm suitable for it.
Obviously each person has their own motives.
Some people will support specifically using an NSA algorithm, I think Satoshi falls in that category. No offense, just a fact.
Some people will say that cryptography should be only a small step ahead of cutting edge, in order to motivate people to learn math. Someone did use that argument. The problem there is that it is just a cheap rationale for academics to submit, surrender, under the guise of some hidden superior motive. e.g. "We are promoting some greater good secretly that justifies helping the NSA with its sneakiness".
Call it conspiracy or anything else, the facts remain.