Post
Topic
Board Hardware
Re: The performance claims and prices are unrealistic
by
pcm81
on 28/01/2013, 04:56:07 UTC
Congratulations, you programmed an FPGA. This is not the same as designing a true ASIC implementation.
No, I actually produced fab ready images for a particular process that I had access to a cell library for, I was in fact specific about this in my post. Geesh. You're trying my patience

Quote
1. In regards to export license, see the link i provided above. SHA-256 requires export license to China.
The link you provided is incorrect— or overly generalized. I have exported products to china commercially which implemented HMAC for authentication. It does not require a license.

Quote
Step 1, generate random contents
Step 2, hash it
Step 3, compare to a known hash. If matches you done, if does not match loop to step 1.
You have omitted  step [2a] "Has the sun stopped shining yet?" ... what you are describing does not actually work in practice for the same reason that hashes are practically secure.


Congratulations, you may have broken US law.
See item #10
csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf

If SHA algorithm you used was not for 256 bits, it may not have required license.