Author Topic: ASIC chips brute forcing  (Read 5055 times)

0 Members and 13 Guests are viewing this topic.

Offline eliaou

  • Serf
  • *
  • Posts: 28
  • Cookies: 0
    • View Profile
ASIC chips brute forcing
« on: December 01, 2013, 11:32:48 pm »
Hi Guys ,


I started to get interested in Cryptocurrency mining and the basic concept ( I guess most of you allready know ) is that you find a solution to a hash a bit like brute forcing , now miners figured out that actually GPU's (and later technology witch are asic chips that run at +- 500 gigahash /s instead of CPU's witch work at max 1 megahash/s ) are alot faster at solving this kind of problems than CPU's are .


My question is : would it  be faster to brute force a  hash with CPU or GPU for anything ?


link (simple diagram about Cryptocurrency mining) : [size=78%]http://imgur.com/IdlzmLA[/size]


Thank You

Offline Snayler

  • Baron
  • ****
  • Posts: 812
  • Cookies: 135
    • View Profile
Re: ASIC chips brute forcing
« Reply #1 on: December 01, 2013, 11:47:23 pm »
GPU faster than CPU.

I mean, you answered your own question...
« Last Edit: December 01, 2013, 11:48:12 pm by Snayler »

Offline ande

  • Owner
  • Titan
  • *
  • Posts: 2664
  • Cookies: 256
    • View Profile
Re: ASIC chips brute forcing
« Reply #2 on: December 01, 2013, 11:59:48 pm »
First of there are multiple flaws in your post.

GPU mining is NOT a new thing, GPU mining started in 2010 or 2011 afaik. Then FPGA chips was used, and now a bit more recently (but still nothing new) ASIC chips are used. Also 500 GH/s +- is not very accurate either. 500 GH/s is pretty good atm. And finally CPU's are not limited to one MH/s, mine does about 6 MH/s and I am sure one can do a bit better than that as well.

I am not sure I understand your question. CPU < GPU / FPGA < ASIC. GPU will pretty much always be faster than CPU.
if($statement) { unless(!$statement) { // Very sure } }
https://evilzone.org/?hack=true

Offline vezzy

  • Royal Highness
  • ****
  • Posts: 771
  • Cookies: 172
    • View Profile
Re: ASIC chips brute forcing
« Reply #3 on: December 02, 2013, 12:01:11 am »
CPU mining is absolutely worthless at the difficulty rate that Bitcoin is now at. This is mining 101.

On the other hand, it's still feasible for cryptocurrencies like Litecoin, which uses a different proof-of-work scheme.
Quote from: Dippy hippy
Just brushing though. I will be semi active mainly came to find a HQ botnet, like THOR or just any p2p botnet

Offline eliaou

  • Serf
  • *
  • Posts: 28
  • Cookies: 0
    • View Profile
Re: ASIC chips brute forcing
« Reply #4 on: December 02, 2013, 12:24:34 am »
What i meant is using it to brute force any regular password lets say

Offline ande

  • Owner
  • Titan
  • *
  • Posts: 2664
  • Cookies: 256
    • View Profile
Re: ASIC chips brute forcing
« Reply #5 on: December 02, 2013, 12:38:28 am »
What i meant is using it to brute force any regular password lets say

Using Bitcoin ASIC's to brute force other algorithms? I don't think so, not without heavy modification. The whole point with ASIC's is that they are application specific and made for that application only. This is what makes them so fast. But obviously you could make a ASIC for other algorithms but I don't know of any on the top of my head.

If you are still wondering: GPUs are much faster than CPUs for general password cracking as well.
« Last Edit: December 02, 2013, 12:38:47 am by ande »
if($statement) { unless(!$statement) { // Very sure } }
https://evilzone.org/?hack=true

Offline eliaou

  • Serf
  • *
  • Posts: 28
  • Cookies: 0
    • View Profile
Re: ASIC chips brute forcing
« Reply #6 on: December 02, 2013, 10:50:13 am »
ok thanks..would it be just modifications in the driver ?

Offline ande

  • Owner
  • Titan
  • *
  • Posts: 2664
  • Cookies: 256
    • View Profile
Re: ASIC chips brute forcing
« Reply #7 on: December 02, 2013, 05:25:06 pm »
ok thanks..would it be just modifications in the driver ?

I honestly don't know for sure. But I would guess this depends on the chip and the extent of the desired modification. ASIC's are created fully or partially custom for one specific task. So I would imagine if you wanted to make a MD5 bruteforcer, a fully custom ASIC for the SHA256 algorithm would be useless without hardware and software modification, which would be substantial modifications as MD5 and SHA256 doesn't have a lot in common.
if($statement) { unless(!$statement) { // Very sure } }
https://evilzone.org/?hack=true

Offline eliaou

  • Serf
  • *
  • Posts: 28
  • Cookies: 0
    • View Profile
Re: ASIC chips brute forcing
« Reply #8 on: December 02, 2013, 05:41:29 pm »
ok..so no brute forcing for me I guess  :'(  .


Thanks for the help anyways

Offline Snayler

  • Baron
  • ****
  • Posts: 812
  • Cookies: 135
    • View Profile
Re: ASIC chips brute forcing
« Reply #9 on: December 02, 2013, 10:39:04 pm »
ok..so no brute forcing for me I guess  :'(  .


Thanks for the help anyways
If you're interested in brute forcing, you should look at the possibility of running multiple GPUs on the same machine (can't remember the technical term). Also, distributed hash cracking is very interesting.

Offline eliaou

  • Serf
  • *
  • Posts: 28
  • Cookies: 0
    • View Profile
Re: ASIC chips brute forcing
« Reply #10 on: December 03, 2013, 06:49:45 pm »
Yes I tought of  parallel computing ,but (sorry for the noobnes here ) is it possible to divide a hash by segment like so : core 1 does "2j" core 2 does "h2".. etc

Or just lets say : core 1 does lowercase core 2 : uppercase ...etc
« Last Edit: December 03, 2013, 06:54:46 pm by eliaou »

Offline ande

  • Owner
  • Titan
  • *
  • Posts: 2664
  • Cookies: 256
    • View Profile
Re: ASIC chips brute forcing
« Reply #11 on: December 03, 2013, 06:55:06 pm »
yea I get it parallel computing, but (sorry for the noobnes here) is it possible to divide a hash by segment like so : core 1 does "2j" core 2 does "h2".. etc
Or just lets say : core 1 does lowercase core 2 : uppercase ...etc

You cant divide the hash but you can perform different types/ranges of brute force on the same hash on different cores.
if($statement) { unless(!$statement) { // Very sure } }
https://evilzone.org/?hack=true

Offline eliaou

  • Serf
  • *
  • Posts: 28
  • Cookies: 0
    • View Profile
Re: ASIC chips brute forcing
« Reply #12 on: December 03, 2013, 07:00:02 pm »
Its a really interesting subject.
But if peoples do it successfully ,can lets say sha-256 be still secure ? because its still
(2^64 ) -1 possible combinations and with a few asic chips and doing some parallel hashing peoples could brute force hashes pretty quick no ?
« Last Edit: December 03, 2013, 07:01:29 pm by eliaou »

Offline ande

  • Owner
  • Titan
  • *
  • Posts: 2664
  • Cookies: 256
    • View Profile
Re: ASIC chips brute forcing
« Reply #13 on: December 03, 2013, 07:13:05 pm »
Its a really interesting subject.
But if peoples do it successfully ,can lets say sha-256 be still secure ? because its still
(2^64 ) -1 possible combinations and with a few asic chips and doing some parallel hashing peoples could brute force hashes pretty quick no ?

I have yet to see a SHA256 ASIC chip. But considering the best ones (Bitcoin) does about 500GH/s now, that's 500 000 000 000 attempts per second. A 10 letter password with upper and lowercase letters would still take ~349774 seconds or ~5829 minutes or ~97 hours or ~4 days. And that's with at least 500GH/s 24/7. Add one number to that password and you have 22 days.

Personally I don't use SHA or any variation of SHA alone anymore. I do multiple rounds with a feedback hash from the previous round and salt.
if($statement) { unless(!$statement) { // Very sure } }
https://evilzone.org/?hack=true

Offline vezzy

  • Royal Highness
  • ****
  • Posts: 771
  • Cookies: 172
    • View Profile
Re: ASIC chips brute forcing
« Reply #14 on: December 03, 2013, 07:16:45 pm »
A hash algorithm's security isn't measured so much in how fast you can bruteforce it (that's more of a side effect), but rather flaws in the actual digest: collisions (primarily), preimage attacks and length extensions (in the event that the hash is based on a Merkle-Damgard construction, most are).

All of these flaws then contribute to how easily and quickly it can be bruteforced, as they show poor entropy.
Quote from: Dippy hippy
Just brushing though. I will be semi active mainly came to find a HQ botnet, like THOR or just any p2p botnet