BitCoin
Why Bitcoin mining ASICs will not crack your password
But can a miner be rigged to do hashing for password hacking?
Architecture
Concrete Construction Forms
Note: ICF == Insulated Concrete Form
Research Links
- Google: concrete forms
- BuildBlock ICF
- Logix ICF
- Fox Blocks – Available at Menards
- YouTube: basement wall concrete forms
- HomeDepot: SmartBlocks
Related Work
Computing
Processors Resistant to Hacking
Research Links
Trusted Execution
- Isolates execution of critical SW from possible malware
- TrustZone Secure & Normal Worlds (processor modes)
- Hardware firewalls between CPU & DMA masters and memory & peripherals
High Assurance Boot
- Authenticated boot: prevents unauthorized SW execution
- Encrypted boot: protects SW confidentiality
- Digital signature checks embedded in on-chip boot ROM
- Run every time processor is reset
HW Cryptographic Accelerators
- i.MX family dependent
- Symmetric: AES-128, AES-256, 3DES, ARC4
- Message Digest & HMAC: SHA-1, SHA-256, MD-5
Secure Storage
- Protects data confidentiality and integrity
- Off-chip: cryptographic protection including device binding
- On-chip: self-clearing Secure RAM • HW-only keys: no SW access
HW Random Number Generation
- Ensures strong keys and protects against protocol replay
- On-chip entropy generation
- Cryptographically secure deterministic RNG
Secure Clock
- Provides reliable time source
- On-chip, separately-powered real-time clock
- Protection from SW tampering
Computing
CryptoCurrency Hashing and Proof of Work Functions
Scrypt
SHA-256
SHA-2
CryptoNote
ECDSA
X11
- Wikipedia: X11 – Dash uses a chained hashing algorithm called X11 for the proof-of-work. Instead of using the SHA-256 (from well-known Secure Hash Algorithm family) or scrypt it uses 11 rounds of different hashing functions
Research Links
Communication
WebRTC Real Time Communication tutorial
Research Links BlogGeek WebRTC project WebRTC codelab
