>> (p.1)
    Author Topic: How much hashing power should one reasonably expect an attacker to have?  (Read 1258 times)
    Topazan (OP)
    Sr. Member
    ****
    Offline Offline

    Activity: 354
    Merit: 250


    View Profile
    August 11, 2012, 05:40:18 PM
     #1

    I've still been thinking about brainwallets, and I wondered about this.

    Basically, I'm thinking that I can use a relatively short memorable password of the correcthorsebatterystaple variety with a strong strengthening algorithm.  I know the tradition is to use recursive hashing, but I was thinking more like a random salt within a limited range.

    Basically, I'd have an address, and my password.  In order to find the private key, I'd have to have an algorithm try, say, a million different salts until it finds a result that matches the private key.

    What I want to know is whether or not a million is a good number.  I'd like to be able to access my coins from an average computer using cpu only in < 10 minutes while slowing down attackers as much as possible.

    Would this work?  How many salts would I need?

    Save the last bitcoin for me!
Page 1
Viewing Page: 1