Ask HN: Bitcoin Mining Operations Perpetuating Weaknesses in SHA-256?
Perhaps some mechanism that would facilitate a birthday attack, collisions, etc.?
I thought I'd float this out there to people who know more about cryptography and the weaknesses of these algorithms than I do.
[+] [-] tptacek|12 years ago|reply
You can do the math on how much it would cost to find a SHA-2 collision; for instance, you can steal Skein team member Jesse Walker's back of the envelope calculations, assigning 2^61 cycles and 2^8 dollars to a server-year. Now multiply the number of cycles a block of SHA256 takes by 2^128.
I don't think a direct attack on SHA256 is a productive use to put the world's computers.
[+] [-] fleitz|12 years ago|reply
You could pregenerate a 'longer' chain, but the problem is the 'legnth' of the chain is calculated based on difficulty not number of blocks, so you'd need more computer power than all miners combined.
If you want to get cynical about US / Chinese approval for BTC it would probably be willingness to buy enough hardware to precompute a longer chain.
The algos to exploit are the RNGs used in the ECDSA portion of BTC which allow you to derive the private key and directly spend bitcoins, there aren't any currently known weaknesses in relation to SHA256 in BTC. The RNG issue is specific to certain implemenations of BTC and has nothing to do with the protocol itself. (Similar to how an exploit for apache is not a weakness in HTTP)
[+] [-] nighthawk|12 years ago|reply
[+] [-] oleganza|12 years ago|reply