The Official Forum  

Go Back   The Official Forum > Basketball
Register FAQ Community Calendar Today's Posts Search

Reply
 
LinkBack Thread Tools Rate Thread Display Modes
  #1 (permalink)  
Old Fri Jan 09, 2015, 03:40pm
LRZ LRZ is offline
Official Forum Member
 
Join Date: Mar 2014
Location: SE PA
Posts: 768
What is a "1-way hash"?
Reply With Quote
  #2 (permalink)  
Old Fri Jan 09, 2015, 03:45pm
In Time Out
 
Join Date: Nov 2008
Posts: 794
When I first singed up for Arbiter I was perplexed with their lack of complex security especially with SSN. I emailed my concerns years back and it seems like the problems still remain especially with encryption. I could be wrong because I don't know what is going on behind the scenes but it just seems with the personal info on there they need to improve their cyber security a lot.
Reply With Quote
  #3 (permalink)  
Old Fri Jan 09, 2015, 04:41pm
Archaic Power Monger
 
Join Date: Mar 2007
Location: Houston, TX
Posts: 5,983
Quote:
Originally Posted by LRZ View Post
What is a "1-way hash"?
Basically it's like a one way valve for encryption. Passwords sent to the server (in this case Arbiter) are transformed into output that is jibberish to a person but can be understood by the program that has the right key. It's one way because the converted data cannot be transformed back into the original password and sent back to anybody requesting it.

It's like the roach motel of passwords.

http://www.webopedia.com/TERM/O/one-..._function.html
__________________
Even if you’re on the right track, you’ll get run over if you just sit there. - Will Rogers
Reply With Quote
  #4 (permalink)  
Old Fri Jan 09, 2015, 06:57pm
Esteemed Forum Member
 
Join Date: Aug 2005
Location: Connecticut
Posts: 23,523
Will The North Koreans Get My Information ???

We service about seventy high schools in our local area. Three years ago, one high school used ArbiterPay. Last year a second school signed on. We have a total of four high schools using it this season. It's the wave of the future, and our state interscholastic sports governing body says that we have to sign up with ArbiterPay to receive our fees from these schools, and any future schools, that choose to use it. There's no choice on our part. We're independent contractors and they can pay us any way they (the schools) want to.

So I signed up this year, figuring I'm going get an assignment at an ArbiterPay high school eventually. Giving ArbiterPay my Social Security Number was one thing (we've been filling out W-9's for years at most schools (I hate it when they leave the forms on the scorers table)), but I hesitated when ArbiterPay asked me for my checking account number. But, like our state interscholastic sports governing body said, we have no choice, so I gave them the information that they wanted. Should I lose sleep over this?
__________________
"For God so loved the world, that he gave his only begotten Son, that whosoever believeth in him should not perish, but have everlasting life." (John 3:16)

“I was in prison and you came to visit me.” (Matthew 25:36)

Last edited by BillyMac; Fri Jan 09, 2015 at 07:11pm.
Reply With Quote
  #5 (permalink)  
Old Fri Jan 09, 2015, 07:14pm
certified Hot Mom tester
 
Join Date: Aug 1999
Location: only in my own mind, such as it is
Posts: 12,918
Lightbulb

Quote:
Originally Posted by BillyMac View Post
but I hesitated when ArbiterPay asked me for my checking account number. But like our state interscholastic sports governing body said, we have no choice, so I gave them the information that they wanted. Should I lose sleep over this?
I have a friend who, a few years ago, was in a similar situation. A company who was going to send him pay for work he was doing as an independent contractor asked for his account number so they could do direct deposit. He went to his bank, opened up a savings account with $20 (their minimum), gave that number to them and then, whenever he got paid, would just make a withdrawal and put the money in his regular account.
__________________
Yom HaShoah
Reply With Quote
  #6 (permalink)  
Old Sat Jan 10, 2015, 09:41am
Ok is the new good
 
Join Date: Oct 2010
Posts: 660
Quote:
Originally Posted by BillyMac View Post
We service about seventy high schools in our local area. Three years ago, one high school used ArbiterPay. Last year a second school signed on. We have a total of four high schools using it this season. It's the wave of the future, and our state interscholastic sports governing body says that we have to sign up with ArbiterPay to receive our fees from these schools, and any future schools, that choose to use it. There's no choice on our part. We're independent contractors and they can pay us any way they (the schools) want to.

So I signed up this year, figuring I'm going get an assignment at an ArbiterPay high school eventually. Giving ArbiterPay my Social Security Number was one thing (we've been filling out W-9's for years at most schools (I hate it when they leave the forms on the scorers table)), but I hesitated when ArbiterPay asked me for my checking account number. But, like our state interscholastic sports governing body said, we have no choice, so I gave them the information that they wanted. Should I lose sleep over this?
Call me old school..but I am a cash and carry kinda guy...I will take a check at the table thank you very much!
Reply With Quote
  #7 (permalink)  
Old Fri Jan 09, 2015, 07:40pm
Official Forum Member
 
Join Date: Aug 1999
Location: In the offseason.
Posts: 12,264
Quote:
Originally Posted by LRZ View Post
What is a "1-way hash"?
It is a transformation of the data from one form to another cryptic form such that you can never reverse the operation. I could give you my password in the transformed format and, even if you had a powerful computer working on it for years, you'd never be able to figure out the original password....even if you knew the exact algorithm I used to transform it.

The only thing you can do with it is use it to confirm that newly supplied information is the same as previously supplied information.

It goes like this:

1. You set a new password.....abc123
2. That password gets converted to dlkVj08.9Auf3@uQl839&dRsa
3. That converted value is stored in the database with your username
4. Later, you log in and provide abc123 as your password
5. The system converts that in to the same as above (the conversion is repeatable).
6. Since you provided the same password as you set up in step 1, the converted values will match and you are allowed in.

A similar technique is used to sign documents or files for downloads. The publisher of the file provides and MD5 checksum (and it is only 32 ascii characters long). If you get the file from an alternate source and check the MD5 of the file you recieved and it matches the one provided by the original publisher, you can be assured that the entire file is the exactly the same. Change even one character anywhere in the file and the MD5 checksum changes dramatically.
__________________
Owner/Developer of RefTown.com
Commissioner, Portland Basketball Officials Association
Reply With Quote
  #8 (permalink)  
Old Sat Jan 10, 2015, 01:05am
beware big brother
 
Join Date: Mar 2012
Location: illinois
Posts: 996
Quote:
Originally Posted by Camron Rust View Post
I could give you my password in the transformed format and, even if you had a powerful computer working on it for years, you'd never be able to figure out the original password....even if you knew the exact algorithm I used to transform it.
I find the bolded, underlined part very hard to believe, especially if the process is repeatable such that each time you enter the same sequence of letters, numbers, and symbols, they get converted into the exact same sequence of new letters, numbers, and symbols over and over again. It would not take a human cryptographer years to break that system, let alone a computer. Even without the algorithm, if you have access to multiple passwords and what they are converted to, it would not take that long to determine the algorithm.
Reply With Quote
  #9 (permalink)  
Old Sat Jan 10, 2015, 05:16am
Official Forum Member
 
Join Date: Aug 1999
Location: In the offseason.
Posts: 12,264
Quote:
Originally Posted by johnny d View Post
I find the bolded, underlined part very hard to believe, especially if the process is repeatable such that each time you enter the same sequence of letters, numbers, and symbols, they get converted into the exact same sequence of new letters, numbers, and symbols over and over again. It would not take a human cryptographer years to break that system, let alone a computer. Even without the algorithm, if you have access to multiple passwords and what they are converted to, it would not take that long to determine the algorithm.
Well, it can possibly be done but you will not be alive to see it done.

The algorithms are published. Even having them and knowing which one was used (as long it is a decent one) really doesn't help much. The math to go backwards from the hashed output to the original input is just too hard for even the best computers to execute in any amount of time that matters.

The typical way cracking works is to use social engineering to guess at what the person might use as a password and try different things until you get it right. They might also just try all combinations of letter, numbers, symbols, etc. until they get the match.

The problem with that is that any decent system will detect repeat failed attempts and just lock the account. So, to have any chance, the hacker needs to obtain a copy of the database so they can run the tests outside of the system. Once the figure it out, they can then use it to break into the account(s).

The hashing algorithms are, however, sufficiently complicated that it just takes too long for it to work well, if at all, as long as you don't use abc123 as your password.

Some older hashing systems have been partially broken but it takes a lot of time with some really powerful computers (ones too expensive for all but big businesses or the government to afford) to get there.

Here is an article that talks about a common encryption technique and how long it would take to crack it:
http://www.eetimes.com/document.asp?doc_id=1279619

Here is a quote from the article:

Quote:
As shown above, even with a supercomputer, it would take 1 billion billion years to crack the 128-bit AES key using brute force attack. This is more than the age of the universe (13.75 billion years). If one were to assume that a computing system existed that could recover a DES key in a second, it would still take that same machine approximately 149 trillion years to crack a 128-bit AES key.
Most breaches in passwords are due to them either being stored in plain text or simply encrypted but the thief finds the encryption key and is able to decrypt them. Hashes, on the other hand, don't have such a key. They are just not practically reversible to get the original password.
__________________
Owner/Developer of RefTown.com
Commissioner, Portland Basketball Officials Association

Last edited by Camron Rust; Sat Jan 10, 2015 at 05:19am.
Reply With Quote
  #10 (permalink)  
Old Sat Jan 10, 2015, 03:49pm
Official Forum Member
 
Join Date: Mar 2014
Posts: 121
Salt please

Quote:
Originally Posted by Camron Rust View Post
Well, it can possibly be done but you will not be alive to see it done.

The algorithms are published. Even having them and knowing which one was used (as long it is a decent one) really doesn't help much. The math to go backwards from the hashed output to the original input is just too hard for even the best computers to execute in any amount of time that matters.

The typical way cracking works is to use social engineering to guess at what the person might use as a password and try different things until you get it right. They might also just try all combinations of letter, numbers, symbols, etc. until they get the match.

The problem with that is that any decent system will detect repeat failed attempts and just lock the account. So, to have any chance, the hacker needs to obtain a copy of the database so they can run the tests outside of the system. Once the figure it out, they can then use it to break into the account(s).

The hashing algorithms are, however, sufficiently complicated that it just takes too long for it to work well, if at all, as long as you don't use abc123 as your password.

Some older hashing systems have been partially broken but it takes a lot of time with some really powerful computers (ones too expensive for all but big businesses or the government to afford) to get there.

Here is an article that talks about a common encryption technique and how long it would take to crack it:
http://www.eetimes.com/document.asp?doc_id=1279619

Here is a quote from the article:



Most breaches in passwords are due to them either being stored in plain text or simply encrypted but the thief finds the encryption key and is able to decrypt them. Hashes, on the other hand, don't have such a key. They are just not practically reversible to get the original password.
Unless you're salting the hash as well, you are suceptible to rainbow tables to figure out the hashed values.
Reply With Quote
  #11 (permalink)  
Old Sat Jan 10, 2015, 05:20pm
Official Forum Member
 
Join Date: Aug 1999
Location: In the offseason.
Posts: 12,264
Quote:
Originally Posted by RefCT View Post
Unless you're salting the hash as well, you are suceptible to rainbow tables to figure out the hashed values.
Indeed...salts dramatically improve it....but how deep do we want to go on this topic on a referee board. Probably too deep already.
__________________
Owner/Developer of RefTown.com
Commissioner, Portland Basketball Officials Association
Reply With Quote
  #12 (permalink)  
Old Sat Jan 10, 2015, 06:06pm
Official Forum Member
 
Join Date: Mar 2014
Posts: 121
Agree

Quote:
Originally Posted by Camron Rust View Post
Indeed...salts dramatically improve it....but how deep do we want to go on this topic on a referee board. Probably too deep already.
Absolutely correct. I am hoping someone from Arbiter reads this since they don't seem to know what they are doing over there. Password encryption is the least of the basic technical issues I have seen. A classic case off growing too big too quickly.
Reply With Quote
  #13 (permalink)  
Old Fri Apr 10, 2015, 09:09am
Official Forum Member
 
Join Date: Sep 2003
Location: Katy, Texas
Posts: 8,033
Quote:
Originally Posted by johnny d View Post
I find the bolded, underlined part very hard to believe, especially if the process is repeatable such that each time you enter the same sequence of letters, numbers, and symbols, they get converted into the exact same sequence of new letters, numbers, and symbols over and over again. It would not take a human cryptographer years to break that system, let alone a computer. Even without the algorithm, if you have access to multiple passwords and what they are converted to, it would not take that long to determine the algorithm.
Let me simplify greatly (it's not THIS easy, but it illustrates the issue)...

What is 6x6? 36
What is 4x9? 36
What is 2x18? 36

If I told you that the question (algorithm) was AxB, and told you the answer (encryption) was 36 ... can you tell me, for sure, what A and B is? No.
__________________
I was thinking of the immortal words of Socrates, who said, 'I drank what?'”

West Houston Mike
Reply With Quote
  #14 (permalink)  
Old Fri Apr 10, 2015, 10:04am
(Something hilarious)
 
Join Date: Jan 2006
Location: These United States
Posts: 1,162
Quote:
Originally Posted by MD Longhorn View Post
Let me simplify greatly (it's not THIS easy, but it illustrates the issue)...

What is 6x6? 36
What is 4x9? 36
What is 2x18? 36

If I told you that the question (algorithm) was AxB, and told you the answer (encryption) was 36 ... can you tell me, for sure, what A and B is? No.
I was told there wouldn't be any math.
__________________
I can't remember the last time I wasn't at least kind-of tired.
Reply With Quote
  #15 (permalink)  
Old Fri Apr 10, 2015, 11:56am
rsl rsl is offline
Official Forum Member
 
Join Date: Oct 2008
Posts: 301
Quote:
Originally Posted by HawkeyeCubP View Post
I was told there wouldn't be any math.
Come on, this the first post in my many years reading the forum that I may know as much about the topic as Bob. But I will still listen to him- always listen to Bob!
Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is On
Trackbacks are On
Pingbacks are On
Refbacks are On


Similar Threads
Thread Thread Starter Forum Replies Last Post
Flaw in rules? largeone59 Football 17 Sun Jan 15, 2006 09:28pm
Flaw in new loss of down rule! ljudge Football 12 Tue Sep 06, 2005 02:21pm


All times are GMT -5. The time now is 02:29pm.



Search Engine Friendly URLs by vBSEO 3.3.0 RC1