> On Feb 26, 2017, at 1:36 AM, Pieter Wuille <pieter.wui...@gmail.com> wrote:
> 
> Typical hash function breaks produce collision attacks, while a preimage 
> attack is needed to reduce single-key address security.

Thank you Pieter - that was really helpful. I realize now that I was thinking 
of a preimage attack but had mistakenly assumed that the birthday bound 
applied...

So the unit operation: [genkeypair; ripemd160(sha256(pubkey));check_utxoset] 
would need to be performed 2.9*10^42 and not (as I had first calculated) 
2.4*10^18. 

Oops. My bad.
_______________________________________________
bitcoin-dev mailing list
bitcoin-dev@lists.linuxfoundation.org
https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev

Reply via email to