stipes | 13 years ago | on: ‘SRP’ Does Not Protect Blizzard's Passwords - See how it's not better than SHA1
stipes's comments
stipes | 13 years ago | on: ‘SRP’ Does Not Protect Blizzard's Passwords - See how it's not better than SHA1
stipes | 13 years ago | on: Blizzard Network Breached; Change Your Battle.Net Passwords
Some numbers run by zaroth (down-thread) [2] show that we could see 100k 1024-bit modular exponentiations per second on a new Intel Core i7 with the cryptography extensions. A 2011 implementation paper [3] had about 20k 1024-bit RSA decryptions per second on a GTX260 using Montgomery exponentiation, so it doesn't seem like using the GPU has that much benefit for performing modular exponentiation. I haven't had time to figure out an estimated price/attempt for SRP, so it's hard to compare to the existing SHA1 figures [4].
Still, if we take the 100k/second figure for modular exponentiation (extrapolated from the number of cycles per 1024-bit modexp on a Core i7), versus the 5B/s for SHA1 on a single GPU, being 50000 times slower than the best SHA1 speeds seems pretty good to me.
1. http://news.ycombinator.com/item?id=4365079
2. http://www.opine.me/blizzards-battle-net-hack/
stipes | 14 years ago | on: Splitterbug (YC S11) shutting down
stipes | 14 years ago | on: Computer compromise leads to theft of bitcoins valued at $500,000 USD
stipes | 15 years ago | on: /dev/random and virtual systems
stipes | 15 years ago | on: /dev/random and virtual systems
However, that might have consequences on what restoring from a snapshot means conceptually.
stipes | 15 years ago | on: /dev/random and virtual systems
stipes | 15 years ago | on: Plain Text Offenders - Did you just email me back my own password?
stipes | 15 years ago | on: Plain Text Offenders - Did you just email me back my own password?
stipes | 15 years ago | on: Genetic Algorithm Used to Build Car With Box2D
stipes | 15 years ago | on: TorChat: p2p instant messenger with a completely decentralized design.
It's an interesting idea, but I'd agree that there are possible ramifications of repeated pseudonymous communication over Tor.
stipes | 15 years ago | on: NYT Review of ‘The 4-Hour Body’
stipes | 15 years ago | on: NYT Review of ‘The 4-Hour Body’
stipes | 15 years ago | on: Digg Founder Kevin Rose Launches Private Newsletter Called Foundation
stipes | 15 years ago | on: The industry as a whole makes its choices on the basis of folklore
Aside from the nitpick, the point is a good one. Thanks for the essay.
stipes | 15 years ago | on: ASK HN: How Did Mint.com Use Open Source Technology To Build a $170MM Company?
stipes | 15 years ago | on: ASK HN: How Did Mint.com Use Open Source Technology To Build a $170MM Company?
stipes | 15 years ago | on: P = NP for Non-Math Majors
However, it is more of a "p vs. np for non CS theory people".
stipes | 15 years ago | on: Lots of Copies Keep Stuff Safe (LOCKSS)
It appears to use some sort of Byzantine fault tolerance in its auditing system (to detect the fault and repair) spread across many "boxes" running the system. There is also a manual audit process by librarians to check that content is correct (this may handle cases where the "live" copies are tampered).
For the most part (from what I can gather from their site), the system is a kind of "self-audited" backup for live content, not for ensuring that that live content is correct. So, for a document that you needed to keep correct (given that a live copy may be tampered), you could simply not have a live copy.
As a point of comparison, it looks like you can get 650 million/s on a cg1.4xlarge instance [1] (Amazon's GPU computing instance with 2x Tesla Fermi M2050 GPUs), and it looks like they cost $2.10/hour per instance. So some quick math does show that cracking SRP is only about 572 times slower, if we normalize for cost of the instances on EC2.
1. http://www.nervous.it/lang/en-us/2012/06/cracking-sha1-on-am...