• by jml7c5 on 3/24/2022, 2:07:26 AM

    The problem is that a hash is not even close to a one-to-one mapping of input data <-> output hash. There are a truly enormous number of possible 4 KiB strings that can produce a given hash. Assuming SHA-1 is evenly distributed, there are 2^(8*4*1024) / 2^160 possibilities (which is 2^32608). You could find some 4 KiB piece that works, but it would almost certainly not be the original. Even if your torrent had a single file with a single missing 4 KiB piece, and even if you had a machine that could spit out every configuration that would pass the hash check, you'd still have 2^32608 theoretically valid files to test.

    (Note: I'm not taking the time to think the specifics through so my math may be incorrect, but the conclusion that the search space would remain huge is sound.)

  • by TechBro8615 on 3/24/2022, 4:47:08 AM

    If you put enough monkeys on type writers, they'll create Ubuntu 18.04 LTS.

  • by wmf on 3/23/2022, 11:03:40 PM

    What you're talking about is a preimage not a collision which is a different kind of attack.

  • by simplicialset on 3/23/2022, 11:13:54 PM

    It's probably easier with quantum computers: https://eprint.iacr.org/2020/213.pdf.

  • by rdtwo on 3/23/2022, 11:13:48 PM

    As in hashing being there ultimate compression… seems unlikely