what fields to hash with hashcash (Re: A Trial Balloon to Ban Email?)

Bill Stewart bill.stewart at pobox.com
Fri May 16 17:20:44 PDT 2003


At 04:53 PM 05/15/2003 +0100, ken wrote:
>So if this was implemented we get incentive to design a new kind of 
>hashing algorithm, one designed to be difficult to run, because all it is 
>needed for is to prove that someone bothered enough to spend the time. 
>Also  it needs to map one plaintext to many valid hashes  of course as 
>others said thats easier when you include the "from:" in the hash or allow 
>some arbitrary field.

The hash is easy to do - Given a target "T",
provide a string "X" for Bit(i,SHA1(X)) == Bit(i,SHA1(T)) for i=1...n,
and Substring(SHA1(X),N+1,160) != Substring(SHA1(T),N+1,160).

You'll need to try roughly 2**N inputs to find one.





More information about the cypherpunks-legacy mailing list