![]() |
|
|
#188 |
|
"Pavel Atnashev"
Mar 2020
22×11 Posts |
It's a model to calibrate your hashes against.
Last fiddled with by patnashev on 2020-06-24 at 04:27 |
|
|
|
|
|
#189 |
|
P90 years forever!
Aug 2002
Yeehaw, FL
2·53·71 Posts |
Some data (now using the attached sliding window exponentiation routine)
Proof level 8: Proof generator does 15489 or 20632 squarings (48-bit vs 64-bit hash) Server does 1080 or 1414 squarings Proof verifier does 390625 squarings (assuming 100,000,000 exponent) Proof level 9: Proof generator does 31485 or 41925 squarings (48-bit vs 64-bit hash) Server does 1207 or 1577 squarings Proof verifier does 195312 squarings (assuming 100,000,000 exponent) From a total system point of view, we can see that proof level 10 is currently optimal. Compared to level 9, generator does 42K more squarings to save the verifier 97K squarings. If 800 PRP tests a day are reported to the server, I think it can handle 1.2M squarings a day. My quad core Haswells can generate 10 million squarings a day. For me, at proof level 9, the 10500 squarings saved for 48-bit vs. 64-bit hash represents 1/2 PRP test a year. |
|
|
|
|
|
#190 | |
|
P90 years forever!
Aug 2002
Yeehaw, FL
2·53·71 Posts |
Quote:
If the future weakness is a reduction in brute force effort, then a longer hash key is our safe guard. So let's rule out 32-bit hash values. If the future weakness revolves around a small hash value, let's thwart them by making all hash values >= 2^32. If the future weakness results from some root-of-unity issue, lets rule out multiples of the PRP base 3. I'd remove multiples of two just for good measure. Removing hashes with more small primes is also possible. In total, this does not greatly reduce the search space for the brute force attacker. I'm happy with 48-bit or 64-bit (or anything in-between!). When eliminating 0 mod 3 hashes, the scheme should not be a simple "add 2" as that would favor 2 mod 3 hashes. Further comments? Time to come up with the concrete algorithm? Last fiddled with by Prime95 on 2020-06-24 at 20:09 |
|
|
|
|
|
|
#191 | |
|
"Will Edgington"
Nov 2010
Utah, USA
23·3 Posts |
If you just want to eliminate values that are multiples of 2 or 3:
Code:
int add[2*3] = { 1, 0, 3, 2, 1, 0 };
value += add[value % 6];
To avoid possibly exceeding 2^64, the array value could be subtracted instead, sometimes leading to a final value < 2^32. If you also want to eliminate multiples of 5, expand the array to 2*3*5 appropriately. -- Will Quote:
|
|
|
|
|
|
|
#192 | |
|
Just call me Henry
"David"
Sep 2007
Cambridge (GMT/BST)
588010 Posts |
Quote:
|
|
|
|
|
|
|
#193 | |
|
"Mihai Preda"
Apr 2015
3×457 Posts |
Quote:
I propose we use simply SHA3-256 truncated to 64bits for the "h" exponents. The chaining of the hash OTOH is done using the full SHA3-256. Maybe we should also present our "simple" hash scheme to the larger crypto community and ask them for an attack? |
|
|
|
|
|
|
#194 |
|
"TF79LL86GIMPS96gpu17"
Mar 2017
US midwest
2×7×383 Posts |
|
|
|
|
|
|
#195 |
|
"Pavel Atnashev"
Mar 2020
548 Posts |
We've started searching for GFN-15 Mega (b^32768+1, 1M digits). b is a hundred-bit number, but Pietrzak VDF works just fine with such numbers.
|
|
|
|
|
|
#196 | |
|
"TF79LL86GIMPS96gpu17"
Mar 2017
US midwest
2·7·383 Posts |
Quote:
The LL test goes as before, but sqrt(p) residues are saved along the way? What is Z? Notation of a ring? What is the process by which those sqrt(p) saved residues are processed to produce a verification of correctness? if it works, this seems to me to offer a more convincing proof of correctly finding a Mersenne prime, than matching zero residues in multiple runs. At the cost of more programming effort to adopt it. Last fiddled with by kriesel on 2020-07-13 at 15:42 |
|
|
|
|
|
|
#197 |
|
"Oliver"
Sep 2017
Porta Westfalica, DE
53910 Posts |
Hi, I have activated the proof feature on my run of M215856353, are you interested in the data? If yes, I'd upload it. It was done using v6.11-325-g7c09e38 with -proof 10.
|
|
|
|
|
|
#198 | |
|
"Mihai Preda"
Apr 2015
3·457 Posts |
Quote:
./gpuowl -prp 215856353 -proof 10 which should re-start the exponent 215856353 from the last checkpoint which is very near 100%, run the few last iterations, and regenerate the proof in the new format. The proof can't be uploaded yet, so you'd still need to keep it around for a bit. |
|
|
|
|
![]() |
Similar Threads
|
||||
| Thread | Thread Starter | Forum | Replies | Last Post |
| phi function | rula | Homework Help | 3 | 2017-01-18 01:41 |
| delay in crediting? | ixfd64 | PrimeNet | 7 | 2008-10-20 20:45 |
| Why delay between posts? | JHagerson | Forum Feedback | 1 | 2006-05-13 21:30 |
| Minimum delay between server connections | vaughan | ElevenSmooth | 5 | 2005-09-08 17:17 |
| Stats delay | ltd | Prime Sierpinski Project | 10 | 2005-08-08 13:38 |