Editing Talk:1193: Externalities

Jump to: navigation, search
Ambox notice.png Please sign your posts with ~~~~

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 99: Line 99:
  
 
:: There should be some cleverness involved in addition to access to computers. It all comes down to who can generate the most hashes in the time available, because as a good cryptographic hash Skein gives you no hint about how to change your input to get a result closer to your target, you just have to keep making guesses. But that is not just a matter of how many computers you have. For example, Googling around for implementations of Skein I didn't find any ready to run libraries for GPUs of Skein 1024 1024. A team at a university could have stuck with an existing C implementation running on an available set of computers, or taken the time to get it running on GPUs and get quite a bit of extra speed. Also, I haven't experimented with it, but a hash function should be faster if you give it a smaller input. The current best result from CMU would take on the average about 1 quadtrillion (1e15) trials to find. Given that the input to the hash has to be in the form of URL-safe printable characters, if you assume that your team will not have time to generate more than, say 1e16 hashes and the character set you have to work with is 100 characters (my guess from looking at my keyboard) then your test input strings do not have to be longer than 8 characters. Anyone who is generating test input for the hash that is any longer, for example if they are, as a really bad example, converting 1024-bit numbers to 256 ASCII character hex, is doing at least 32 times too much work for each hash calculation. [[User:Bugstomper|Bugstomper]] ([[User talk:Bugstomper|talk]]) 00:37, 3 April 2013 (UTC)
 
:: There should be some cleverness involved in addition to access to computers. It all comes down to who can generate the most hashes in the time available, because as a good cryptographic hash Skein gives you no hint about how to change your input to get a result closer to your target, you just have to keep making guesses. But that is not just a matter of how many computers you have. For example, Googling around for implementations of Skein I didn't find any ready to run libraries for GPUs of Skein 1024 1024. A team at a university could have stuck with an existing C implementation running on an available set of computers, or taken the time to get it running on GPUs and get quite a bit of extra speed. Also, I haven't experimented with it, but a hash function should be faster if you give it a smaller input. The current best result from CMU would take on the average about 1 quadtrillion (1e15) trials to find. Given that the input to the hash has to be in the form of URL-safe printable characters, if you assume that your team will not have time to generate more than, say 1e16 hashes and the character set you have to work with is 100 characters (my guess from looking at my keyboard) then your test input strings do not have to be longer than 8 characters. Anyone who is generating test input for the hash that is any longer, for example if they are, as a really bad example, converting 1024-bit numbers to 256 ASCII character hex, is doing at least 32 times too much work for each hash calculation. [[User:Bugstomper|Bugstomper]] ([[User talk:Bugstomper|talk]]) 00:37, 3 April 2013 (UTC)
:The time it takes to compute a Skein hash depends only on the number of bits of internal state, not of the input. This is intentional; if the execution time were dependent on input length, an attacker could execute a timing attack on the hash. AES is known to be sensitive to such attacks, but Skein is resistant. [[Special:Contributions/140.254.153.76|140.254.153.76]] 04:14, 3 April 2013 (UTC)
 
  
 
Is it over now that it's after midnight?  When I moused over the school name, it didn't give me a pop-up showing the next hint.  [[Special:Contributions/76.106.251.87|76.106.251.87]] 06:06, 2 April 2013 (UTC)
 
Is it over now that it's after midnight?  When I moused over the school name, it didn't give me a pop-up showing the next hint.  [[Special:Contributions/76.106.251.87|76.106.251.87]] 06:06, 2 April 2013 (UTC)

Please note that all contributions to explain xkcd may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see explain xkcd:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel | Editing help (opens in new window)

Templates used on this page: