Post
Topic
Board Development & Technical Discussion
Re: What if somebody makes an ASIC to crack SHA-256 hashes with Brute force?
by
Totscha
on 19/02/2015, 13:40:38 UTC
Maybe I was not clear enough.

..., then my question is different: How long until everything falls apart?

Since you are new here, maybe you haven't seen this:

[img]

Cheesy nice pic.

However, I'm not influenced by soft sentences and big pictures, I need to have solid proofs to feel safe.

A normal CPU out there, running at 10% its max speed is able to generate between 1 to 10 Hashes per second. (at least it was so with some tests I made some time ago, but it can take a bit more with some performance enhancements)

If you consider an available miner on the market, they are already able to generate 1 TeraHashes PER Second, that already counting with all calculations and everything.

Basically multiplies a basic computer power by TRILLIONS of times and all of this in just 6 years.

So I think its time for us (bitcoiners) to start worrying about the security of our addresses.

Thats why I'm asking these questions, can the TH/s capabilities used by ASIC miners be used to generate Bitcoin private Keys?

If yes, we may be running out of time and Bitcoin developers will probably have to update the Bitcoin hashing very soon and this would probably be bad news for the market.

If no, we may have a bit more time, but with quantum computing on the rise we may have to think about this in few years.

Just consider that Satoshi lost his private keys and has no access to this addresses and someone is able to crack his addresses, Bitcoin will die the next day.

I hope he still has access to his addresses and is alive when the Bitcoin developers have to update the Bitcoin hashing.... so he can still transfer his bitcoins to a new generation address.

1. The average CPU can do 1-10 MILLION hashes per second. So an ASIC is only a million times better. But anyway you cannot compare a general purpose CPU to an ASIC. It is still same generation hardware. Computers did not get a million times better in 6 years.
2. A hashing ASIC cannot do private key checks.
3. I don't think you understood the text around the picture Wink
4. Keep calm and don't worry about brute force.
5. If it were possible it would already be done. It takes a smart guy to make an ASIC and they all know a private key brute force is not worth the effort Smiley