Size: a a a

2019 September 12

D

Dobrodel in Sherlock Club
AB CryptoLamer
Уровень лени: лень пролистать 3 сообщения выше
три пролистал, а оно выше было(
источник

AC

AB CryptoLamer in Sherlock Club
Наконец-то можно будет спросить про 9й лист вайтпейпера
источник

AC

AB CryptoLamer in Sherlock Club
Upcoming ask me anything session with UltrAlpha!

UltrAlpha Fund is committed to building out a professional investment platform for digital asset management and collaborating with the BitMax.io trading platform to further support the structural optimization of digital asset trading ecosystem.
BitMax.io trading platform to further support the structural optimization of digital asset trading ecosystem.

The AMA will take place on September 12th, 2019 from 16:00 to 17:00 UTC in our Chat Room. Add the event to your calendar and make sure you prepare your questions beforehand.

This AMA will give you the opportunity to connect with UltrAlpha's team who will answer your questions and listen to your feedback.

-----------------------------------------------

🕐 Countdown 🕐

The AMA will take place in our Chat Room: https://t.me/CryptoRankEn
источник

FM

Freddie Matias | CryptoRank.io in Sherlock Club
AB CryptoLamer
Наконец-то можно будет спросить про 9й лист вайтпейпера
😂☝️
источник

A

Aleksandr in Sherlock Club
Народ, привет! На какой бирже можно держать iost и получать награду за стейкинг?
источник

AC

AB CryptoLamer in Sherlock Club
Aleksandr
Народ, привет! На какой бирже можно держать iost и получать награду за стейкинг?
@iost_best, подскажи
источник

AC

AB CryptoLamer in Sherlock Club
У меня на biss.com. Вроде еще есть хуоби и кошельки всякие типо cobo
источник

ДI

Дмитрий IOST_BEST NODE in Sherlock Club
если биржа, то бисс, да.
удобнее с мобильных кошельков стейкать, есть плагин для хром
https://forum.iost.io/t/faq-most-frequently-asked-questions-in-iost-official-international-telegram-group/85
источник

M

Maxim in Sherlock Club
Aleksandr
Народ, привет! На какой бирже можно держать iost и получать награду за стейкинг?
гугл подсказывает, что как минимум кукоин)
источник

b

bigstrongboy in Sherlock Club
Ламер,спецом для тебя нарыл
источник

b

bigstrongboy in Sherlock Club
Pedersen hash weaknesses

Pedersen hash has been popularized by Zcash team as ZK-friendly hash function suitable for Merkle trees. Its simplest version operates on an elliptic curve with two fixed generators G and H with unknown discrete log relation. Then to hash two integers (a,b) one computes

P = aG + bH

and takes some compressed version of P (e.g. x-coordinate) as a result. There are several extensions of this construction to longer messages using multiple generators [1] or just by a recursive Merkle-Damgard calling.  In contrast to regular hash functions like Keccak there is a formal security proof for collision resistance as any collision implies a discrete logarithm relation between G and H.

There are several problems with this construction. First, from the implementation perspective it is quite complicated. To hash messages within some field F, one has to define an elliptic curve with the order bigger than |F| but the coordinates being in F. For zero-knowledge proofs one has to convert elliptic curve equations into degree-2 constraints, and also work with the bit representation of (a,b) in order to reduce the scalar multiplication to point addition and doubling. Altogether this makes quite a non-trivial circuit, but it is still doable.

From the cryptographic point  of view the situation is worse. Pedersen hash has several properties quite unexpected from a cryptographic hash function. First, it is homomorphic: H(ab,cd) = H(a,b) + H(c,d). This property alone is not problematic and is even common for cryptographic commitments and many other primitives. However, it implies that the function is vulnerable to length-extension attacks: given H(A) it is easy to compute H(A,B) for some integer tuples A and B. This property, being present in SHA-0/1/2 and forbidden in SHA-3, caused many attacks like [2]. It makes a natural MAC construction MAC(M) = H(K || M) insecure, and rules out a common domain separation method of creating many functions from one as H_i(x) = H(i||x).

Finally, the preimage security of Pedersen is weaker than expected. For an n-bit elliptic curve it is not 2^(n/2) as one would hope for. If the hashed message is l-bit long for l<n the preimage search cost is not min(2^l,2^(n/2)) but only 2^(l/2). Indeed, let a and b be l/2 -bit long. Then define f(x) = xG and g(y) = P-yH. Thus the preimage  for P is just a collision between f and g, which can be found memoryless in 2^(l/2) steps. Last but not least, the multi-target preimage security is even lower: to find 2^k preimages for l-bit messages, one performs only 2^(l/2+k/2) hash function calls thus making the amortized preimage search cost as low as 2^(l/2-k/2). In concrete numbers, if one hashes 1000 128-bit messages with Pedersen, each preimage costs you only 2^59.

We do not recommend using Pedersen hash in protocols and applications.

[1] https://iden3-docs.readthedocs.io/en/latest/iden3_repos/research/publications/zkproof-standards-workshop-2/pedersen-hash/pedersen.html
[2] http://netifera.com/research/flickr_api_signature_forgery.pdf
источник

R

RadisT in Sherlock Club
bigstrongboy
Pedersen hash weaknesses

Pedersen hash has been popularized by Zcash team as ZK-friendly hash function suitable for Merkle trees. Its simplest version operates on an elliptic curve with two fixed generators G and H with unknown discrete log relation. Then to hash two integers (a,b) one computes

P = aG + bH

and takes some compressed version of P (e.g. x-coordinate) as a result. There are several extensions of this construction to longer messages using multiple generators [1] or just by a recursive Merkle-Damgard calling.  In contrast to regular hash functions like Keccak there is a formal security proof for collision resistance as any collision implies a discrete logarithm relation between G and H.

There are several problems with this construction. First, from the implementation perspective it is quite complicated. To hash messages within some field F, one has to define an elliptic curve with the order bigger than |F| but the coordinates being in F. For zero-knowledge proofs one has to convert elliptic curve equations into degree-2 constraints, and also work with the bit representation of (a,b) in order to reduce the scalar multiplication to point addition and doubling. Altogether this makes quite a non-trivial circuit, but it is still doable.

From the cryptographic point  of view the situation is worse. Pedersen hash has several properties quite unexpected from a cryptographic hash function. First, it is homomorphic: H(ab,cd) = H(a,b) + H(c,d). This property alone is not problematic and is even common for cryptographic commitments and many other primitives. However, it implies that the function is vulnerable to length-extension attacks: given H(A) it is easy to compute H(A,B) for some integer tuples A and B. This property, being present in SHA-0/1/2 and forbidden in SHA-3, caused many attacks like [2]. It makes a natural MAC construction MAC(M) = H(K || M) insecure, and rules out a common domain separation method of creating many functions from one as H_i(x) = H(i||x).

Finally, the preimage security of Pedersen is weaker than expected. For an n-bit elliptic curve it is not 2^(n/2) as one would hope for. If the hashed message is l-bit long for l<n the preimage search cost is not min(2^l,2^(n/2)) but only 2^(l/2). Indeed, let a and b be l/2 -bit long. Then define f(x) = xG and g(y) = P-yH. Thus the preimage  for P is just a collision between f and g, which can be found memoryless in 2^(l/2) steps. Last but not least, the multi-target preimage security is even lower: to find 2^k preimages for l-bit messages, one performs only 2^(l/2+k/2) hash function calls thus making the amortized preimage search cost as low as 2^(l/2-k/2). In concrete numbers, if one hashes 1000 128-bit messages with Pedersen, each preimage costs you only 2^59.

We do not recommend using Pedersen hash in protocols and applications.

[1] https://iden3-docs.readthedocs.io/en/latest/iden3_repos/research/publications/zkproof-standards-workshop-2/pedersen-hash/pedersen.html
[2] http://netifera.com/research/flickr_api_signature_forgery.pdf
фаталэррор, отец завязывай, где фотки с холодосом и вот это вот все?
источник

b

bigstrongboy in Sherlock Club
RadisT
фаталэррор, отец завязывай, где фотки с холодосом и вот это вот все?
Епта,тока собрался умным прикинуться...😂
источник

AC

AB CryptoLamer in Sherlock Club
bigstrongboy
Pedersen hash weaknesses

Pedersen hash has been popularized by Zcash team as ZK-friendly hash function suitable for Merkle trees. Its simplest version operates on an elliptic curve with two fixed generators G and H with unknown discrete log relation. Then to hash two integers (a,b) one computes

P = aG + bH

and takes some compressed version of P (e.g. x-coordinate) as a result. There are several extensions of this construction to longer messages using multiple generators [1] or just by a recursive Merkle-Damgard calling.  In contrast to regular hash functions like Keccak there is a formal security proof for collision resistance as any collision implies a discrete logarithm relation between G and H.

There are several problems with this construction. First, from the implementation perspective it is quite complicated. To hash messages within some field F, one has to define an elliptic curve with the order bigger than |F| but the coordinates being in F. For zero-knowledge proofs one has to convert elliptic curve equations into degree-2 constraints, and also work with the bit representation of (a,b) in order to reduce the scalar multiplication to point addition and doubling. Altogether this makes quite a non-trivial circuit, but it is still doable.

From the cryptographic point  of view the situation is worse. Pedersen hash has several properties quite unexpected from a cryptographic hash function. First, it is homomorphic: H(ab,cd) = H(a,b) + H(c,d). This property alone is not problematic and is even common for cryptographic commitments and many other primitives. However, it implies that the function is vulnerable to length-extension attacks: given H(A) it is easy to compute H(A,B) for some integer tuples A and B. This property, being present in SHA-0/1/2 and forbidden in SHA-3, caused many attacks like [2]. It makes a natural MAC construction MAC(M) = H(K || M) insecure, and rules out a common domain separation method of creating many functions from one as H_i(x) = H(i||x).

Finally, the preimage security of Pedersen is weaker than expected. For an n-bit elliptic curve it is not 2^(n/2) as one would hope for. If the hashed message is l-bit long for l<n the preimage search cost is not min(2^l,2^(n/2)) but only 2^(l/2). Indeed, let a and b be l/2 -bit long. Then define f(x) = xG and g(y) = P-yH. Thus the preimage  for P is just a collision between f and g, which can be found memoryless in 2^(l/2) steps. Last but not least, the multi-target preimage security is even lower: to find 2^k preimages for l-bit messages, one performs only 2^(l/2+k/2) hash function calls thus making the amortized preimage search cost as low as 2^(l/2-k/2). In concrete numbers, if one hashes 1000 128-bit messages with Pedersen, each preimage costs you only 2^59.

We do not recommend using Pedersen hash in protocols and applications.

[1] https://iden3-docs.readthedocs.io/en/latest/iden3_repos/research/publications/zkproof-standards-workshop-2/pedersen-hash/pedersen.html
[2] http://netifera.com/research/flickr_api_signature_forgery.pdf
Ебать, писать о высшей математике в посте в телеге. Я думал таких маньяков не существует
источник

R

RadisT in Sherlock Club
bigstrongboy
Епта,тока собрался умным прикинуться...😂
просто ты перепутал граммовки с мат формулами)
источник

m

mezoantropo | Elrond fellowship in Sherlock Club
Pepe Svin
а то к 20, пото к 15, потом к 10
А ты где заходил?
источник

П

Позитив in Sherlock Club
RadisT
просто ты перепутал граммовки с мат формулами)
Привет, сори за офтоп) Насколько помню ты входил  Минтер,  у тебя случаем нету свободных бипов?)
источник

R

RadisT in Sherlock Club
Позитив
Привет, сори за офтоп) Насколько помню ты входил  Минтер,  у тебя случаем нету свободных бипов?)
я все слил)
источник

П

Позитив in Sherlock Club
RadisT
я все слил)
Понял,  жаль)
источник

D

Dobrodel in Sherlock Club
Куда пропал Nomo кажется, совместно с ним проводили конкурсы статьей
источник