Steve Davis [ARCHIVE] on Nostr: 📅 Original date posted:2017-02-26 📝 Original message:> On Feb 26, 2017, at 1:36 ...
📅 Original date posted:2017-02-26
📝 Original message:> On Feb 26, 2017, at 1:36 AM, Pieter Wuille <pieter.wuille at gmail.com> wrote:
>
> Typical hash function breaks produce collision attacks, while a preimage attack is needed to reduce single-key address security.
Thank you Pieter - that was really helpful. I realize now that I was thinking of a preimage attack but had mistakenly assumed that the birthday bound applied...
So the unit operation: [genkeypair; ripemd160(sha256(pubkey));check_utxoset] would need to be performed 2.9*10^42 and not (as I had first calculated) 2.4*10^18.
Oops. My bad.
Published at
2023-06-07 17:56:47Event JSON
{
"id": "e480dc80b7bbc8e95ff94bf14e69bfceda59bbf14c6194e60242b60722632bd5",
"pubkey": "9a6b73449cedd35eb88283522be919f8cf94d5a720336c8e843c2dcd56d53e3c",
"created_at": 1686160607,
"kind": 1,
"tags": [
[
"e",
"37053a195373ca87d2cc167b4470872a0425d55bfe62c38a20deac2033060b94",
"",
"root"
],
[
"e",
"5c95cbeadd70cc9e437710d33b1a3f6f75166596db5c0a700d3a32a96b0751b6",
"",
"reply"
],
[
"p",
"9a6b73449cedd35eb88283522be919f8cf94d5a720336c8e843c2dcd56d53e3c"
]
],
"content": "📅 Original date posted:2017-02-26\n📝 Original message:\u003e On Feb 26, 2017, at 1:36 AM, Pieter Wuille \u003cpieter.wuille at gmail.com\u003e wrote:\n\u003e \n\u003e Typical hash function breaks produce collision attacks, while a preimage attack is needed to reduce single-key address security.\n\nThank you Pieter - that was really helpful. I realize now that I was thinking of a preimage attack but had mistakenly assumed that the birthday bound applied...\n\nSo the unit operation: [genkeypair; ripemd160(sha256(pubkey));check_utxoset] would need to be performed 2.9*10^42 and not (as I had first calculated) 2.4*10^18. \n\nOops. My bad.",
"sig": "7f0e7d39b1f17267a217cb699bd94d70ba8592e0df8bf4493ad8512f0145ac925ab06a7ff05c3154bb66f7d34de3a16775c4f74c1296c86248c0030362076ddc"
}