Yeah, something like that. “Make the state of the universe such that it’s much easier to compute knowing h than without h” doesn’t mean that the computation will use any interesting features of h, it could just be key-stretching.
Could you flesh this out? I’m not familiar with key-stretching.
A pretty critical point is whether or not the hashed value is algorithmically random. The depth measure has the advantage of picking over all permissible starting conditions without having to run through each one. So it’s not exactly analogous to a brute force attack. So for the moment I’m not convinced on this argument.
Yeah, something like that. “Make the state of the universe such that it’s much easier to compute knowing h than without h” doesn’t mean that the computation will use any interesting features of h, it could just be key-stretching.
Could you flesh this out? I’m not familiar with key-stretching.
A pretty critical point is whether or not the hashed value is algorithmically random. The depth measure has the advantage of picking over all permissible starting conditions without having to run through each one. So it’s not exactly analogous to a brute force attack. So for the moment I’m not convinced on this argument.