Questions on: theory

Assume for a second that we found a proof of work algorithm that had all of the good properties of sha256, but was also useful for SETI and maintaining world peace. Now suppose a group of miners collectively have more than 51% of the hashing power. I
OWASP has a Password Storage Cheat Sheet with some guidance; they recommend 64,000 PBKDF2 iterations minimum as of 2012, doubling every two years (i. e. 90,510 in 2013)
There are a number of attacks which have the potential to allow an attacker to double spend but none of them are successful when the recommended practice of accepting payment only when the transaction has six or more confirmations against it. For ins
We’ve recently been made aware of a paper discussing the possibility of forks in the Ripple system. We agree with the authors’ conclusion that a fork is not possible given that the UNL overlap is greater than 40%. Unfortunately, this is different tha
To formulate this question precisely, I will define an idealized hypothetical "perfect" hash function H(n) which has nice scalability properties, and will formulate a problem PERFECT HASHCASH in terms of that, understanding that practical considerati
While in theory, a fork can be achieved at any depth, in practice, the computing power needed to force a very deep fork is immense, making old blocks practically immutable. Consensus attacks also do not affect the security of the private keys and sig
All the recent media attention on Bitcoin inspired me to learn how Bitcoin really works, right down to the bytes flowing through the network. Normal people use software [1] that hides what is really going on, but I wanted to get a hands-on understand
A string of alphanumeric characters that represents a destination for a Bitcoin payment Some customers won't need to understand or use these addresses at all, as Bitcoin addresses are not required in order to send and receive money at Circle. You can