Author

Topic: Future : Effect of mining on use of SHA-2 in general ... (Scenario for 2014 & +) (Read 1217 times)

donator
Activity: 1731
Merit: 1008
How and when will the industries using SHA-2 for securing sensitive data will feel compelled to change algorithm because of mining hardware manufacturing ?

The current generation of BFL ASICs may not be of any use for cracking password but future ASICs products will want to take advantage of it's ease or implementation, increasing profits and lessening risks.  See : https://bitcointalksearch.org/topic/m.968530

Back in the days it used to be secure to use 9+ character passwords for securing a WiFi AP,,, now 12 is the norm.
I fear that eventually people willing to use a password they can remember will not be able to do so with anything sha2 secured.

  • SHA-2 is the world most trusted secure algorithm.
  • Some devices have sha1-2 embedded in hardware, as is the case in many routers / vpn.

(might be related) : Cryptanalysis of AES and SHA-2: how far we are from compromising worldwide encryption and hashing standards
Jump to: