Re: [tor-onions] brute forcing Onion domains

2020-04-26 Thread teor
Hi,

V2 onions are a truncated SHA1. Doing an entire hash is expensive.

V3 onions are an ed25519 key plus a suffix. So if you're just looking
for a prefix, you can choose a random value. Then increment by the
basepoint until you find the prefix you want. (This is a relatively
cheap operation, because you're just adding 255-bit numbers.)

You can save the expensive suffix calculations for the final
candidate keys.

Here's one implementation:
https://github.com/Yawning/horse25519/blob/master/src/horse25519.c#L209  

This is a summary: there are a few important details to get right,
like key masking and security.

T

-- 
teor
--


> On 27 Apr 2020, at 06:37, niftybunny  
> wrote:
> 
> Hi there,
> 
> quick question. Is there a fundamental time difference between brute forcing 
> V3 to V2 Onion domains or did my 4 lucky feet just stopped working?
> 
> niftybunny
> 
> 
> ___
> tor-onions mailing list
> tor-onions@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-onions
___
tor-onions mailing list
tor-onions@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-onions


[tor-onions] brute forcing Onion domains

2020-04-26 Thread niftybunny
Hi there,

quick question. Is there a fundamental time difference between brute forcing V3 
to V2 Onion domains or did my 4 lucky feet just stopped working?

niftybunny




signature.asc
Description: Message signed with OpenPGP
___
tor-onions mailing list
tor-onions@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-onions