Author

Topic: Bicliques preimage attack, is it a worry? (Read 1074 times)

hero member
Activity: 709
Merit: 503
October 03, 2014, 08:57:43 AM
#5
The referenced paper is obviously a public attack, so to speak.  One wonders what the state of the art is non-publicly.   I suppose the paper might be as good as it gets at this point.
hero member
Activity: 709
Merit: 503
October 03, 2014, 08:54:15 AM
#4
One wonders if the Bitcoin reference implementation is built upon one of the SHS validated http://csrc.nist.gov/groups/STM/cavp/documents/shs/shaval.htm SHA-256 implementations.
hero member
Activity: 709
Merit: 503
October 03, 2014, 08:50:14 AM
#3
Ah, SHA-256 is 64 rounds, whereas the paper in question talks about of an attack at 45 rounds.  I gather it is not just a matter of working harder the same way to get to 46 or more rounds but rather novel enhancements are required if it is even possible.
staff
Activity: 4284
Merit: 8808
October 02, 2014, 12:30:14 PM
#2
No, more certification weaknesses (around 2^256 work) on reduced round versions.
hero member
Activity: 709
Merit: 503
Jump to: