[Cryptography] SHA-256 decrypted (8 rounds)
Michael Kjörling
9bf3a7ef93bb at ewoof.net
Mon Apr 8 02:55:03 EDT 2024
On 6 Apr 2024 09:12 -0700, from ron at flownet.com (Ron Garret):
> Because they don't have a sha256 hash of
> deb360ae3c1ff7a29f83731b33dcd4bf354a5e80de2dc50370ebf55a14216b85.
> At best they produce that value after a limited number of rounds (i
> didn't actually check) but that is not the challenge.
That is also not consistent with a reasonable interpretation of one
claim that was made by McDair, who specifically stated that "when
expanded to the full 64 rounds, the method finds 'a' valid input
message". (See McDair's post dated 7 Jan 2024 12:06 UTC, message-ID
<O8Ulq67s866xgJJK6QUAU7y2eWHuDq8ySZ2x3wF-IUKW4SuyH3Nv9IocvszpX5Av2x6zy5ulnk8u01cI27ZktiNjaiF0bL5Aeq0UL3flbEU=@protonmail.com>
archived at <https://www.metzdowd.com/pipermail/cryptography/2024-January/038287.html>.)
> (BTW, it is easily seen that McDair's examples are almost certainly
> not fulfillments of Ray's challenge simpy because he gives more than
> one example. If all of those examples were in fact fulfillments of
> Ray's challenge then not only would he have found a sha256 preimage,
> he would have found a *collision*, and that would be Big News.)
Editorial comment: the challenge was issued by me; not by Ray
Dillinger as McDair indicated in the post dated 28 March 2024 10:42 UTC,
message-ID <CC2D-QBePuVd2YiNOC9TgkVgCWSkBEBDR1D1mfd48GoLMFP48j7S2py5fmL7txf9pYcBMXknZDuhXQrD-KD-4r7klXr0sU--IWP9ThHvjY4=@protonmail.com>,
archived at <https://www.metzdowd.com/pipermail/cryptography/2024-March/038315.html>.
The challenge was issued in my post dated 8 Jan 2024 15:03 UTC,
message-ID <2d6288d9-106b-4b91-8289-5309c9c06d95 at home.arpa>, archived at
<https://www.metzdowd.com/pipermail/cryptography/2024-January/038288.html>.
--
Michael Kjörling 🔗 https://michael.kjorling.se
“Remember when, on the Internet, nobody cared that you were a dog?”
More information about the cryptography
mailing list