New preprint exploring unconventional cryptanalysis:
β’ Framework: βInverse Dimensionalizationβ
β’ Target: SHA-256 structural analysis
β’ Result: 174/256 matching bits (Mβ = 88514, Mβ = 88551)
β’ Time: 3.8 seconds
β’ NOT a collision β but statistically anomalous
Paper + reproducible code: https://doi.org/10.17605/OSF.IO/6YRW8
Full paper with math and code: https://doi.org/10.17605/OSF.IO/6YRW8
Paper: https://osf.io/6yrw8/files/wj9ze
Code: https://osf.io/6yrw8/files/zy8ck
Verification code: https://osf.io/6yrw8/files/pqne7
Device specifications used to find the 174/256-bit match in 3.8 seconds:
β’ Google Colab Free CPU
β’ Intel Xeon
β’ Clock speed: between 2.20 GHz and 2.30 GHz
β’ Cores (vCPUs): 2 virtual cores
β’ RAM: 12 GB
Security implications discussion welcome.