find some scrapped HD video stunt box boards on ebay, do a little world-class hacking, and break "secure" hash functions while you wait
http://nsa.unaligned.org/index.php Now for the bad news... (A) He's using 4 year old hardware. Apply 3 cycles of Moore's Law. (Literally, He's using Virtex II, and Virtex V is out.) (B) His result, searching the 8-char keyspace in one day, implies that he's using a single box. 64**8 keys / 15 FPGAs / 200 MHz (approx) = 94000 seconds =~ 1 day. There's nothing keeping someone with a real hardware budget from ganging a few racks of these together. So where do we go from here? Secure hashes are a very useful mechanism, but between this hack (and obvious extrapolations of what it can do) and the Chinese collision generation algorithms, the commonly used hash functions aren't looking so good. Do we just move further up the SHA chain, sha-256, sha-512, etc., or are they just buying us a few years? Jim _______________________________________________ [email protected] mailing list http://lists.hosef.org/cgi-bin/mailman/listinfo/luau
