--- begin forwarded text
To: [EMAIL PROTECTED]
Subject: Re: [p2p-hackers] SHA1 broken?
Date: Thu, 17 Feb 2005 14:25:36 -0800 (PST)
From: [EMAIL PROTECTED] (Hal Finney)
Reply-To: Peer-to-peer development. [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]
The problem with the attack scenario where two
- Original Message -
From: Joseph Ashwood [EMAIL PROTECTED]
Sent: Friday, February 18, 2005 3:11 AM
[the attack is reasonable]
Reading through the summary I found a bit of information that means my
estimates of workload have to be re-evaluated. Page 1 Based on our
estimation, we expect
- Original Message -
From: Dave Howe [EMAIL PROTECTED]
Subject: Re: SHA1 broken?
Indeed so. however, the argument in 1998, a FPGA machine broke a DES
key in 72 hours, therefore TODAY... assumes that (a) the problems are
comparable, and (b) that moores law has been applied to FPGAs
Joseph Ashwood wrote:
I believe you are incorrect in this statement. It is a matter of public
record that RSA Security's DES Challenge II was broken in 72 hours by
$250,000 worth of semi-custom machine, for the sake of solidity let's
assume they used 2^55 work to break it. Now moving to a