Bitcoin Miner breaks several Giga hashes per second the hardware says ASIC .
Vera Crypt uses the same hash function as Bitcoin ... but with a different number of cycles.
It is possible that ASIC break passwords based on the hash function SHA256 ???
In my opinion, this is perhaps a weakness ...
Therefore, should be replaced by a hashing algorithm , or add a few hundred thousand cycles hash function .
I have a question for Mr. Idrassi
It is not afraid that someone programmed software for ASIC hardware / equipment that will break headr -key for a few seconds to the speed of breaking hash function SHA 256 ????
Sry my english is esay (using google translator)
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
I have already analyzed the security against dedicated ASIC hardware in another post and I demonstrated the importance of having a long and strong password.
That's where the PIM function comes into use. Personally I use a PIM above 5000000 iterations, along with keyfiles which should make my volumes safe enough.
Last edit: Anonymous 2018-01-19
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
Bitcoin Miner breaks several Giga hashes per second the hardware says ASIC .
Vera Crypt uses the same hash function as Bitcoin ... but with a different number of cycles.
It is possible that ASIC break passwords based on the hash function SHA256 ???
In my opinion, this is perhaps a weakness ...
Therefore, should be replaced by a hashing algorithm , or add a few hundred thousand cycles hash function .
I have a question for Mr. Idrassi
It is not afraid that someone programmed software for ASIC hardware / equipment that will break headr -key for a few seconds to the speed of breaking hash function SHA 256 ????
Sry my english is esay (using google translator)
I have already analyzed the security against dedicated ASIC hardware in another post and I demonstrated the importance of having a long and strong password.
Here is the link to my analysis: https://sourceforge.net/p/veracrypt/discussion/general/thread/09696187/#491d
Any feedback on my calculations and conclusion is welcomed.
View and moderate all "General Discussion" comments posted by this user
Mark all as spam, and block user from posting to "Forums"
That's where the PIM function comes into use. Personally I use a PIM above 5000000 iterations, along with keyfiles which should make my volumes safe enough.
Last edit: Anonymous 2018-01-19