Bitcoin Stack Alternate is a query and reply web site for Bitcoin crypto-currency fanatics. It solely takes a minute to enroll.
Anyone can ask a query
Anyone can reply
The very best solutions are voted up and rise to the highest
Requested
Seen
17k occasions
All ASIC for Bitcoin do a double SHA256 hash on an arbitrary string. However perhaps they is likely to be used for pen testing 🙂
Lets assume we’ve got single SHA256 hash we wish to crack. We even have an ASIC that does double SHA256. Nicely if we examine outcomes computed by double SHA256 to passwords that generated SHA256 hash we are going to get nothing. However what if we do single SHA256 on SHA256 hash that we bought on begin utilizing CPU, after which attempt to discover SHA(SHA256(x))? If we discover goodX it might be our password.
Would modifying firmware, or simply mining proxy that feeds miner with work do the job?
2
It won’t assist even when passwords have been hashed with DSHA256. This hyperlink explains why. https://rya.nc/asic-cracking.html
Mainly the ASIC hundreds the header into its reminiscence and increments the nonce till the hash of the header is decrease than the the required goal.
Subsequently you can not use this to brute pressure a password seeing because the logic is incompatible.
0
So, these solutions are all nice. They’re all lacking one big level. ASICs will not be ONLY for bitcoin miners, although the OP i imagine was referring to mining ASICs. However an ASIC (or Utility Particular Built-in Circuit) could be designed for any variety of calculations, equivalent to password cracking. I’m sure a minimum of nation state actors have already got these. So the reply is YES, ASICs can be utilized to crack passwords, however they must be particularly designed to crack passwords utilizing a particular algorithm.
Most mining ASICs are hard-coded to carry out sha256(sha256(x)) which can as effectively be a random quantity with regard to sha256(x). The one means through which an ASIC can be helpful for password cracking is that if somebody occurred to be utilizing sha256(sha256(password)) as their scheme, which to my information will not be in common use anyplace.
1
A double hash brings you no nearer to cracking the primary one. Every hash makes the supply more durable to find out. There are an infinite variety of sources that may produce the identical hash worth. An ASIC may help a dictionary assault.
2
You possibly can design an ASIC to do any calculation you need. For instance, to illustrate you stole a password database from a webpage. You understand that the passwords have been hashed utilizing bcrypt. So that you would want to createbuy an ASIC that does the bcrypt hash perform. It might be quicker at brute pressure cracking than an everyday CPUGPU. This could nonetheless take a really very long time. An ASIC highly effective sufficient to crack passwords can be very costly. I imagine the NSA dabbled on this darkish artwork. They seemingly have machines devoted to cracking particular hash features.
Double SHA1 could be very a lot in use in SQL password hashing. It is called the ‘MySQL 4.1+’ hash kind. How about {hardware} mods on an asic chip to carry out double-sha1 decrypt as an alternative of double-sha2-256?
1