This page brings together everything I’ve written and keeps an updated table of the status of popular bitcoin hash chart hash functions. 128-bit hash is irresponsible based on sheer digest length.
Xiaoyun Wang and Dengguo Feng and Xuejia Lai and Hongbo Yu happened. Google spent 6500 CPU years and 110 GPU years to convince everyone we need to stop using SHA-1 for security critical applications. In 2007, the NIST launched the SHA-3 competition because “Although there is no specific reason to believe that a practical attack on any of the SHA-2 family of hash functions is imminent, a successful collision attack on an algorithm in the SHA-2 family could have catastrophic effects for digital signatures. The Hash Function Lounge has an excellent list of references for most of the dates. Wikipedia now has references to the rest. Serious weakness discovered Tension-filled CRYPTO rump sessions! First collision found Uncork the champagne!
Meaningful collisions generated on home computer How adorable! What’s this crypto library function for? Bitcoin is a cryptocurrency, a digital asset designed to work as a medium of exchange that uses cryptography to control its creation and management, rather than relying on central authorities. Prior to the release of bitcoin there were a number of digital cash technologies starting with the issuer based ecash protocols of David Chaum and Stefan Brands. In the bit gold proposal which proposed a collectible market based mechanism for inflation control, Nick Szabo also investigated some additional enabling aspects including a Byzantine fault-tolerant asset registry to store and transfer the chained proof-of-work solutions. The possibility that Satoshi Nakamoto was a computer collective in the European financial sector has also been discussed. On 18 August 2008, the domain name bitcoin.