Author Topic: ASIC chips brute forcing  (Read 5054 times)

0 Members and 12 Guests are viewing this topic.

Offline eliaou

  • Serf
  • *
  • Posts: 28
  • Cookies: 0
    • View Profile
Re: ASIC chips brute forcing
« Reply #15 on: December 03, 2013, 07:35:49 pm »

Entropy ? (again sorry for the noobness )


Do you mean that by definition a password  becomes more complex and has many layers of change til it becomes a hash ?  and by collision do you mean that there can be a recognizable pattern how the entropy develops , and by that the computer arrives at a conclusion as to what the original password or the prime number was ?


(by the way i love this forum lots of smart peoples here , its refreshing to see that it still exists in the internet  :) )
« Last Edit: December 03, 2013, 07:53:26 pm by eliaou »

Offline ande

  • Owner
  • Titan
  • *
  • Posts: 2664
  • Cookies: 256
    • View Profile
Re: ASIC chips brute forcing
« Reply #16 on: December 04, 2013, 02:13:03 am »
Entropy - The measure of randomness in a hash (In this case anyway)(Someone correct me if i'm wrong).

Basically you want a hash function to have a completely different output even if the input is only changed a tiny tiny tiny bit. So that hash of aaaaa is not even CLOSE or similar of hash of aaaab.

Collisions is when you have two different inputs that produce the same output in a hash function. There is no such thing as a hash without a collision, this is because a hash is of fixed length. However, the entropy of a hash determines "how often" a collision will occur or "how good" an hashing algorithm is.


(Someone please correct me if I am mistaken above, its getting rather late over here)
« Last Edit: December 04, 2013, 02:13:22 am by ande »
if($statement) { unless(!$statement) { // Very sure } }
https://evilzone.org/?hack=true

Offline eliaou

  • Serf
  • *
  • Posts: 28
  • Cookies: 0
    • View Profile
Re: ASIC chips brute forcing
« Reply #17 on: December 04, 2013, 11:42:53 am »
Thanks for the info ande .

I got alot more questions but I think I can continue this one on google

+1 cookie
« Last Edit: December 04, 2013, 11:44:23 am by eliaou »

Offline Stackprotector

  • Administrator
  • Titan
  • *
  • Posts: 2515
  • Cookies: 205
    • View Profile
Re: ASIC chips brute forcing
« Reply #18 on: December 04, 2013, 12:10:51 pm »
One of the main reasons CPU mining is slow (rather than saying gpu mining is fast) is because CPU implements a lot of security features and has more features who come in handy in running an operation system and securing it. The GPU is more based on raw calculations wich makes it faster.
~Factionwars

Offline eliaou

  • Serf
  • *
  • Posts: 28
  • Cookies: 0
    • View Profile
Re: ASIC chips brute forcing
« Reply #19 on: December 04, 2013, 06:21:23 pm »
Security in the CPU itself ?


Do you mean that it has security in the gate transistors or/and in the logic circuit ?
« Last Edit: December 04, 2013, 06:41:00 pm by eliaou »

Offline Stackprotector

  • Administrator
  • Titan
  • *
  • Posts: 2515
  • Cookies: 205
    • View Profile
Re: ASIC chips brute forcing
« Reply #20 on: December 05, 2013, 09:45:41 am »
Security in the CPU itself ?


Do you mean that it has security in the gate transistors or/and in the logic circuit ?
Yhea a CPU has rings and modes http://en.wikipedia.org/wiki/Ring_(computer_security). Also a CPU has virtual memory and more features wich are required to run a OS but not required to do raw operations.
~Factionwars

Offline lucid

  • #Underground
  • Titan
  • **
  • Posts: 2683
  • Cookies: 243
  • psychonaut
    • View Profile
Re: ASIC chips brute forcing
« Reply #21 on: December 05, 2013, 10:13:13 am »
Entropy - The measure of randomness in a hash (In this case anyway)(Someone correct me if i'm wrong).

Basically you want a hash function to have a completely different output even if the input is only changed a tiny tiny tiny bit. So that hash of aaaaa is not even CLOSE or similar of hash of aaaab.

Collisions is when you have two different inputs that produce the same output in a hash function. There is no such thing as a hash without a collision, this is because a hash is of fixed length. However, the entropy of a hash determines "how often" a collision will occur or "how good" an hashing algorithm is.


(Someone please correct me if I am mistaken above, its getting rather late over here)
Nah you're not wrong. This is part of the reason why an algo is only so good for so long. People used to think it would take a Cray supercomputer years to crack DES.
« Last Edit: December 05, 2013, 10:13:41 am by lucid »
"Hacking is at least as much about ideas as about computers and technology. We use our skills to open doors that should never have been shut. We open these doors not only for our own benefit but for the benefit of others, too." - Brian the Hacker

Quote
15:04  @Phage : I'm bored of Python