Author

Topic: Can SHA256 have a backdoor? (Read 661 times)

legendary
Activity: 4424
Merit: 4794
January 30, 2016, 03:07:56 PM
#13
No, I don't think that it is possible. A lot more things than Bitcoin run on SHA-256. If Bitcoin was manipulated this way, we'll simply swicth to another cryptocurrency. However, this would the chaos Cheesy !
but in some ways signature hashing of sha256 can be manipulated to give false readings.
   hash length extension attack

so although sha256 is safe in regards to how bitcoin uses it.. other applications have been misused

So, if I understood correctly your message, that's only Bitcoin that make a proper use of SHA-256 ?

no. other things do too.. but some dont.
legendary
Activity: 1120
Merit: 1004
January 30, 2016, 02:44:14 PM
#12
No, I don't think that it is possible. A lot more things than Bitcoin run on SHA-256. If Bitcoin was manipulated this way, we'll simply swicth to another cryptocurrency. However, this would the chaos Cheesy !
but in some ways signature hashing of sha256 can be manipulated to give false readings.
   hash length extension attack

so although sha256 is safe in regards to how bitcoin uses it.. other applications have been misused

So, if I understood correctly your message, that's only Bitcoin that make a proper use of SHA-256 ?
legendary
Activity: 4424
Merit: 4794
January 30, 2016, 02:39:24 PM
#11
No, I don't think that it is possible. A lot more things than Bitcoin run on SHA-256. If Bitcoin was manipulated this way, we'll simply swicth to another cryptocurrency. However, this would the chaos Cheesy !
but in some ways signature hashing of sha256 can be manipulated to give false readings.
   hash length extension attack

so although sha256 is safe in regards to how bitcoin uses it.. other applications have been misused
legendary
Activity: 1120
Merit: 1004
January 30, 2016, 01:12:12 PM
#10
No, I don't think that it is possible. A lot more things than Bitcoin run on SHA-256. If Bitcoin was manipulated this way, we'll simply swicth to another cryptocurrency. However, this would the chaos Cheesy !
sr. member
Activity: 689
Merit: 269
January 30, 2016, 12:55:12 PM
#9
What type of Backdoor? Collision? Partial Collision? Second pre image attack?

"Decryption" backdoor - recover first preimage from hash.  Grin





Yes and they secretly mine using it Grin That explains the high difficulty Grin
sr. member
Activity: 689
Merit: 269
January 30, 2016, 12:53:40 PM
#8
Backdoor is doubtful.  


You're right.

Let me just add, as a reference, these people have been testing crypto hash functions in the lab, SHA256 since 2004.

http://csrc.nist.gov/groups/STM/cavp/documents/shs/shaval.htm

So for example they tested in 2004 the 234 F-Secure® Cryptographic Library for Windows 2000 . If you are interested you can buy this product and test if it's the indeed the same function Bitcoin uses. Protip: yes
donator
Activity: 1617
Merit: 1012
January 30, 2016, 12:49:59 PM
#7
What type of Backdoor? Collision? Partial Collision? Second pre image attack?

"Decryption" backdoor - recover first preimage from hash.  Grin
legendary
Activity: 1302
Merit: 1008
Core dev leaves me neg feedback #abuse #political
January 30, 2016, 12:41:28 PM
#6
Backdoor is doubtful.  

Read this.

https://bitcointalk.org/index.php?topic=598903.5




RIPEMD-160 and SHA-256 are well understood Merkle–Damgard designs which have been extensively studied for over a decade.  So I believe ECDSA will be weakened long before either of the hashing algorithms.
sr. member
Activity: 689
Merit: 269
January 30, 2016, 12:35:53 PM
#5
Let's talk. What would they do? Open that file and change one of the numbers? Then fake all books about crypto and update it on all websites?
legendary
Activity: 4424
Merit: 4794
January 30, 2016, 12:28:14 PM
#4
This is the whole thing:
http://www.opensource.apple.com/source/zfs/zfs-59/zfs_kext/zfs/sha256.c
Just one table and two procedures. Care to explain to us what may be hidden in there?

not quite 2 procedures.. check the ..
sr. member
Activity: 689
Merit: 269
January 30, 2016, 12:20:12 PM
#3
And I considered the possibility of hashing algorithm used in Bitcoin having some sort of backdoor. There has been some articles in certain websites talking about this too, which lead to the conspiracy theories with your favorite 3 letter agencies. I want to know what are the chances that this is certain and someone that is technically sound to give this any credit or discard it as absolutely tinfoilhat nonsense.

What type of Backdoor? Collision? Partial Collision? Second pre image attack?

Are you aware that SHA256 and RIPEMD160 are the most heavily scrutinized cryptographic hash function out there?

This is the whole thing:
http://www.opensource.apple.com/source/zfs/zfs-59/zfs_kext/zfs/sha256.c
Just one table and two procedures. Care to explain to us what may be hidden in there?
legendary
Activity: 2674
Merit: 2970
Terminated.
January 30, 2016, 11:39:09 AM
#2
You should ignore anyone who starts these kinds of threads or people who seriously believe in these conspiracy theories. These people obviously have nothing better to do in their lives (flat Earth believers anyone?) which implies a lack of education as well. Don't let them get to you.

And I considered the possibility of hashing algorithm used in Bitcoin having some sort of backdoor. There has been some articles in certain websites talking about this too, which lead to the conspiracy theories with your favorite 3 letter agencies. I want to know what are the chances that this is certain and someone that is technically sound to give this any credit or discard it as absolutely tinfoilhat nonsense.
Anyhow, there is always a possibility of this. Now calculating the odds here would be quite difficult. If you ask me, tt is a very tiny possibility since someone would have most likely discovered the backdoor/flaw by now. You should not be worried about this. If SHA256 does appear to be broken (e.g. in the news; evidence of someone tempering with it in Bitcoin) the whole financial system would most likely collapse and the world goes into chaos. Bitcoin would be the least of your worries then. Remember that most of these institutions (e.g. Banks) use SHA256.
legendary
Activity: 1358
Merit: 1014
January 30, 2016, 11:21:27 AM
#1
I was reading this thread:

https://bitcointalksearch.org/topic/satoshi-nakamoto-is-100-a-usuk-government-agency-collaboration-1345897

And I considered the possibility of hashing algorithm used in Bitcoin having some sort of backdoor. There has been some articles in certain websites talking about this too, which lead to the conspiracy theories with your favorite 3 letter agencies. I want to know what are the chances that this is certain and someone that is technically sound to give this any credit or discard it as absolutely tinfoilhat nonsense.
Jump to: