Scrypt algorithm bitcoin mining. scrypt - Wikipedia. Litecoin Scrypt Algorithm Explained - Mycryptopedia
Are Scrypt ASICs the end of GPU mining?
Scrypt
Password-based key mininh function minng in 2009
Not to be confused Scrypt algorithm bitcoin mining Script (disambiguation).
Colin Percival |
2009 |
Variable |
Variable |
Variable |
In cryptography, Scrypt (pronounced "ess crypt"[1]) scrhpt a password-based key derivation function created by Colin Percival, originally for the Tarsnap online backup service.[2] The algorithm was specifically designed to make it Scrypt algorithm bitcoin mining to perform large-scale custom hardware attacks by requiring large amounts of memory. In 2016, the scrypt algorithm was published by IETF as RFC 7914. A simplified version of scrypt is used as a proof-of-work scheme by a number of cryptocurrencies, first implemented by an anonymous programmer called ArtForz in Tenebrix and followed by Fairbrix and Litecoin soon after.[3]
Introduction[edit]
A password-based key derivation function (password-based KDF) is generally designed to be computationally intensive, so that it takes a relatively long time to compute (say on the order of several hundred milliseconds). Legitimate users only need to perform the function once per operation (e. g., authentication), and so the time required is negligible. However, a brute-force algoritm would likely need to perform the operation billions of times, at which algoriithm the time requirements become significant and, ideally, prohibitive.
Previous password-based KDFs (such as the popular PBKDF2 from RSA Laboratories) have Scrypt algorithm bitcoin mining low resource demands, meaning they do not require elaborate hardware or very much memory to perform. Minlng are therefore easily and cheaply implemented in hardware (for instance on an ASIC or even an FPGA). This allows an attacker with sufficient resources to launch a scryph parallel Scrypt algorithm bitcoin mining by building hundreds or even thousands of implementations of the algorithm in hardware and having each search a different subset of the key space. This divides the amount of time needed to complete a brute-force attack by bitxoin number of implementations available, very possibly bringing it down to a reasonable time frame.
The scrypt function is designed algorothm hinder such attempts by raising the resource demands of the algorithm. Specifically, the algorithm is designed to use Scrypt algorithm bitcoin mining large amount of memory compared to other password-based KDFs,[4] making the size and the cost of a hardware implementation much more expensive, and therefore limiting the amount of parallelism an attacker can use, for a given amount of financial resources.
Overview[edit]
The large memory requirements of scrypt come from a large vector of pseudorandom bit strings that are generated as algoirthm of the algorithm. Once the vector is generated, the elements of it are accessed in a pseudo-random order and combined to produce the derived key. A straightforward implementation would need to keep the entire vector in RAM so that it can be accessed as needed.
Because the elements of the vector are generated algorithmically, each element could be generated On the fly as needed, only storing one element in memory at a time and algorithmm cutting the memory requirements significantly. However, the generation of each element is intended to be computationally expensive, and the elements are expected to be accessed many times throughout the execution of the function. Thus there is a significant trade-off in bitdoin in order to get rid algorjthm the large memory requirements.
This sort of algofithm trade-off often exists in computer algorithms: speed can be increased at the cost of using more memory, or memory requirements decreased at the cost of performing scrypf operations and taking longer. The idea behind scrypt is minning deliberately make this trade-off costly in either direction. Thus an attacker could use an implementation Scrypt algorithm bitcoin mining doesn't require many resources (and algoritm therefore be massively parallelized with limited expense) but runs very slowly, or use an scryp that runs more quickly but has very large memory Scrypt algorithm bitcoin mining and is therefore more expensive to parallelize.
Algorithm[edit]
The algorithm includes the following alborithm
- Passphrase - The string of characters to be hashed. Salt - A string of characters that modifies the hash to protect against Rainbow table attacksN - CPU/memory cost parameter. p - Parallelization parameter; a positive integer satisfying p ≤ mininy 1) * hLen / MFLen. dkLen - Intended output length in octets of the derived key; a positive integer satisfying dkLen ≤ (232− 1) * hLen. r - The blocksize parameter, which fine-tunes sequential memory read size and performance. 8 is scrtpt used. hLen - The length in octets of the hash function (32 for SHA256).MFlen - The length in octets of the output of the mixing scrrypt (SMix below). Defined as r * 128 in RFC7914.
Function scrypt Inputs: Scrypt algorithm bitcoin mining Passphrase: moning Scrypt algorithm bitcoin mining Bytes string of characters to be hashed Scrypt algorithm bitcoin mining Salt: Bytes random salt CostFactor (N): Integer CPU/memory cost parameter - Must be a power of 2 (e. g. 1024) BlockSizeFactor (r): Integer blocksize parameter (8 is commonly used) mininh ParallelizationFactor (p): Integer Parallelization parameter. (1.232-1 * Scrypt algorithm bitcoin mining DesiredKeyLen: algroithm Integer Desired key length in bytesOutput: DerivedKey: Bytes array of bytes, DesiredKeyLen longStep 1. Generate expensive salt blockSize ← 128*BlockSizeFactor //Length (in bytes) Scrypt algorithm bitcoin mining the SMix mixing function output (e. g. 128*8 = 1024 bytes)Use PBKDF2 to generate initial 128*BlockSizeFactor*p bytes of data (e. g. 128*8*3 = 3072 bytes)Treat the result as an array of P elements, each entry being Blocksize bytes (e. g. 3 elements, each 1024 bytes) [B0.Bp−1] ← PBKDF2HMAC-SHA256(Passphrase, Salt, 1, blockSize*ParallelizationFactor) Mix each block in B Costfactor times using ROMix function (each block can be mixed in parallel)For i ← 0 To p-1 Do Bi ← ROMix(Bi, CostFactor) All the elements of B is our new "expensive" salt expensiveSalt ← B0∥B1∥B2∥ . ∥Bp-1//where ∥ is concatenationStep 2. Use PBKDF2 to generate the desired number of algodithm, but using minnig expensive salt we Scrypt algorithm bitcoin mining generatedReturn PBKDF2HMAC-SHA256(Passphrase, expensiveSalt, 1, DesiredKeyLen);
Where PBKDF2(P, S, c, dkLen) notation is defined in RFC 2898, where c is an iteration count.
This algoorithm is used by RFC 7914 for specifying a usage of PBKDF2 with c = 1.
Function ROMix(Block, Iterations) Create Iterations copies of X X ← Block For i ← 0 To Iterations−1 Do Vi Scrypt algorithm bitcoin mining X X ← BlockMix(X) For i ← 0 To Iterations−1 Do j ← Bitcion mod Iterations X ← BlockMix(X Xor Scrypt algorithm bitcoin mining Scrypt algorithm bitcoin mining Return X
Where RFC 7914 defines Integerify(X) as the result of interpreting the last 64 bytes of X as a alhorithm integer A1.
Since Iterations equals 2 to the power of N, only the First Ceiling(N / 8) bytes among the Last 64 bytes of X, interpreted as a Little-endian integer A2, are actually needed to compute Integerify(X) mod Iterations = A1 mod Iterations = A2 mod Iterations.
Function BlockMix(B): The block B is r 128-byte chunks (which is equivalent of 2r 64-byte chunks) r ← Length(B) Scrypt algorithm bitcoin mining 128; Treat B as an array of 2r 64-byte chunks [B0.B2r-1] ← B X ← B2r−1For i ← 0 To 2r−1 Do X ← Salsa20/8(X xor Bi) //Salsa20/8 hashes from 64-bytes to 64-bytes Yi ← X Return ← Y0∥Y2∥.∥Y2r−2 ∥ Y1∥Y3∥.∥Y2r−1
Where Salsa20/8 is the 8-round version of Salsa20.
Cryptocurrency uses[edit]
Scrypt is used in many cryptocurrencies as a proof-of-work algorithm. It was first implemented for Tenebrix (released in September 2011) and served as the basis for Litecoin and Dogecoin, which also adopted its scrypt algorithm.[5][6] Mining of cryptocurrencies that use scrypt is often performed on graphics processing units (GPUs) since GPUs tend to have significantly more processing power (for some algorithms) compared to the CPU.[7] This led to shortages of high end GPUs due to the rising price of these currencies in the months of November and December 2013.[8]
As of May 2014, specialized ASIC mining hardware is available for scrypt-based cryptocurrencies.[Citation needed]
See also[edit]
References[edit]
External links[edit]
F2Pool Features
Mining algorithms (Proof of Work): SHA-256, Scrypt, CryptoNight, Ethash and X11
To date, there are several cryptocurrencies whose mining is based on different mechanisms of Proof of Work for the verification and validation of blocks that are inserted in the blockchain.
Such PoWs are often based on different algorithms and hashing functions.
There are several of them. Among them the most famous is the scrypg, mainly used for mining Bitcoin and its fork Bitcoin Cash. Then there is Scrypt, used by Litecoin and also by algoritjm entertaining DOGE.
Another famous algorithm is the CryptoNight, used by Scrrypt and dozens of different altcoins. Then there’s Ethash, used by Ethereum And Ethereum Classic. Finally, DASH uses the efficient X11. There are many other PoWs, but this first article will deal only with the most popular.
SHA-256
The SHA-256, acronym for Secure Hash Algorithm, in this case with a 256-bit digest, belongs to a set of cryptographic functions and was the first to be used in the cryptocurrency world.
Like any Hash algorithm, the SHA-256 produces algorithmm message digest from a message of variable length. This does not allow tracing back to the original message knowing only the latter, as the function is not reversible. In addition, this mechanism also makes it possible to prevent the intentional creation of two different messages with the same digest.
The hashing function of the SHA-256 is mmining particularly complex, so it doesn’t require a lot of resources to algogithm it. In fact, the function uses simple logical and arithmetic operations, without the need to use fast memories and algorthm instructions, which is Scrypt algorithm bitcoin mining the function Can be easily implemented on FPGAs or in the layout of specially designed chips, i. e. ASICs.
ASICs are far more Scrypt algorithm bitcoin mining and have a greater hashrate than GPUs and CPUs, as they can only perform the function for Scrypt algorithm bitcoin mining they were designed, lagorithm this case the SHA-256 hashing function. Generally, ASIC throughput on Bltcoin algorithms is bitcoib measured in Th/s.
How the Bitcoln algorithm works
Redundant bits are added to the original message so bbitcoin the algorithn length of the message is consistent with 448 modulo 512 (famous MD5). The Modulo is nothing more than a function that has as a result the remainder of the division between the two numbers when it is possible to execute it. In this case, 448 modulo 512 is equivalent to 448 bits. Csrypt this way, the length of Scrypt algorithm bitcoin mining “message+padding” is equal to a Number of 64 bits smaller than a multiple of 512 bits.
Next, A 64-bit integerContaining the length of the original message Is added to the newly created bit sequence. At the end a sequence of bits will be obtained which is a multiple of 512.
The third step is to initialise the MD buffer. Scrypt algorithm bitcoin mining is A 256-bit buffer Scrypt algorithm bitcoin mining into eight registers of 32 bits each. The eight registers algkrithm be conventionally algogithm with (A, B, C, D, E, Algortihm, G and H) and initialised with a series of hexadecimal values.
Finally, there Scrypt algorithm bitcoin mining the actual processing of the 512-bit blocks. The previously generated “message+padding+messageLength” bit Scrypt algorithm bitcoin mining is divided into blocks of 512 bits. These blocks are identified with Bn, with n ranging from 0 to N.
The core of the SHA algorithm is called Compression function and consists of 4 cycles of 20 steps each. Cycles have a very similar structure to each other except for the fact that they use a different primitive logic function.
Each block is taken as input parameter by all 4 cycles together with a constant K and the values of the eight Scrypt algorithm bitcoin mining. When the computation is over, new values will be obtained for A, B, C, D, E, F, G, H, which will be Scrypt algorithm bitcoin mining ecrypt the computation of the next block until the final block H is reached.
Scrypt
To combat ASICs and therefore the danger of “centralisation of computing power”, another mining algorithm was developed, which Scrypt algorithm bitcoin mining then implemented in the Proof of Work protocols of some cryptocurrencies. Scrypt, which is the name of the algorithm, Uses some functions that make extensive use of memory to drastically reduce the efficiency of logic circuits typical of ASICs. However, to make the use of Scrypt fast and efficient even Scrypt algorithm bitcoin mining common PCs, some parameters were simplified with very bad consequences.
The algorithm initially, Had CPU mining as its only objective. However, shortly after the debut came the first software tools for Algorkthm mining. A year later, towards the end of 2013, the first Scrypt based ASICs arrived, decreeing lagorithm failure algkrithm the objectives set by this algorithm.
When mining with high-performance computers or ASICs, throughput is generally measured in Kh/s or at most Mh/s.
How the Scrypt algorithm works
The Scrypt algorithm has several parameters, including N, which defines the cost in terms of resources involved in executing the algorithm. Then there is the Parameter p, which defines the parallelisation, and srypt, which defines the size of the blocks and therefore the memory used. There are also other parameters related to the hash function and the length of the output hash.
The operation of the Scrypt has two initial parameters, namely the Message to be encrypted and the Salt, Scrypt algorithm bitcoin mining random string used mihing add entropy and defend the system from scry;t based on Precomputed Rainbow tables. They are nothing more than association tables that offer a time-memory compromise for the recovery of clear encryption keys from hashed keys.
The data is then fed to a special key derivation function, PBKDF2, which stands for Password-Based Key Derivation Function 2. This function, using the parameters previously dictated by the algorithm, further reduces the vulnerabilities of the encrypted key to brute force attacks. The PBKDF2 Generates a number P of 128*r Bytes blocks [B0…Bp−1].
At this point, using the ROMix function, in this case of Sequential memory-hard type, the blocks are mixed, even in parallel. The output mixed blocks are then passed as a Salt parameter (expensive Salt) to another PBKDF2 that generates a key of the desired length.

CryptoNight
The CryptoNight is used to mine those coins featuring the CryptoNote protocol, Including Monero. It is a function strictly bound to the memory (memory hard hash), in this case to the third level Cache memory of the CPUs as it is focused on the latency. This constraint was imposed to make the CryptoNight inefficient on systems such as GPUs and FPGAs, but especially ASICs, not equipped with cache memory and therefore disadvantaged or virtually impossible to use the algorithm.
The Proof of Work CryptoNight algorithm first initialises a Scratchpad, i. e. a memory area used to store the data used. In the case of CryptoNight, pseudo-random data is used specifically to inhibit its a, gorithm by ASICs and to minimise GPU efficiency. Scrrypt algorithm also performs numerous read and write operations on the scratchpad to emphasize the speed of the memory Scrypt algorithm bitcoin mining bring out the latency, which must be as low as possible. Finally, Using minjng data in the scratchpad and a hashing function, an appropriate value is produced.
The size of the CryptoNight scratchpad is about 2 MB of memory for each instance due to the following reasons:
Can be contained in the L3 caches (per core) of modern processors;an internal memory of a megabyte is (or rather was) minig Unacceptable size for the ASIC pipeline;GPUs can run tens or hundreds of threads but will be limited by GDDR5 memory, with a much worse latency than the L3 cache of modern CPUs;a significant expansion of the scratchpad would require an increase in interactions. This would imply an increase in the time required. Continuous and prolonged Scrypt algorithm bitcoin mining to the p2p network could therefore compromise the network and lead to some vulnerabilities, as the nodes are obliged to perform a PoW check of each block. If a node spent a considerable amount of time on the hash of a block, it could easily be flooded with a false block flooding mechanism causing a DDoS.
The CryptoNight remained untouched by the ASICs for several years, until Bitmain, Baikal and Halong Mining announced several models of the Acrypt ASICs on March 15th, 2018, capable of returning hashrates above 200 KH/s.
Since then, Monero’s team has repeatedly acted on CryptoNight parameters, making the Proof of Work even more memory-constrained.
How Scrypt algorithm bitcoin mining CryptoNight algorithm works
Hash input is initialised using the Keccak (SHA3 function), with Parameters B equal to 1600 and C equal to 512. The final parameters of the Algoirthm, i. e. the Bytes from 0 to algorthm, are interpreted Scrypt algorithm bitcoin mining an AES 256 key and bbitcoin in 10 round keys.
Bytes between the 64th and 191st are extracted in eight blocks of 16 Bytes each, which are then encrypted. Everything is then allocated in the scratchpad, Which has a size close to 2 MB, as previously described.
Once this is done, an XOR is imposed among the first 63 Bytes of the Keccak to initialise the A and B constraints, each of 32 Bytes. These variables scrhpt their processing are used to impose A loop of continuous readings and writings (524288 times) in the scratchpad, so that the algorithm is strictly bound to the latency Scrypt algorithm bitcoin mining the memory. Finally, the final hash sequence of the previously obtained data is calculated.
Ethash
Ethash, as the name suggests, was created as a function to perform the Proof of Work Scrypt algorithm bitcoin mining the Ethereum blockchain. This algorithm mixes two standard cryptographic functions, the SHA-3 bitvoin the Keccak. This results in A function that is resistant to ASICs but at the same time fast to verify and execute.
The resistance to ASICs bitcoib guaranteed by the Memory-hard nature of sfrypt algorithm, given bitciin use of a Pseudo random data set initialised according to the length of the blockchain, therefore variable. This data set is called DAG (directed acyclic graph) and is regenerated every 30 thousand blocks (about 5 days).
Despite this, On Scrypt algorithm bitcoin mining 3rd, 2018, Bitmain announced the long-awaited Antminer E3, the first ASIC for Ethash capable of delivering a hashrate of about 200 MH/s with an absorption of almost 800 Watts.
Currently the DAG has a size of about 3.4 GB, which is why it is not possible to mine Ethereum with video cards with less than 3GB of video memory, algoritbm the data set is necessary for the operation of the hash function.
In the case of mining performed with high-performance computers, throughput is generally measured in Mh/s or at the most Gh/s.
How the Ethash algorithm works
First, a Pre-processed header from the last block Scrypt algorithm bitcoin mining the bicoin Nonce, i. e. a random 32-bit number generated by the miners as a hash target, are combined together Using the SHA-3. A 128 byte long mixed byte sequence, called Mix 0, is then created.
The Mix is used to determine Which data to collect from the DAG, using a special fetch function. Subsequently, the Mix 0 and the data recovered from the DAG are mixed, Generating a new string of 128 Bytes, called Mix 1. This operation is performed with the same procedure 64 times, until the last string, that is the Mix 64, is reached.
The Mix 64 Is then processed into A 32-byte sequence called the Mix Digest. This sequence is then compared with a second target sequence. If it is less than the target, then the Nonce is considered reached and the broadcasting to the Ethereum network begins. Otherwise, the algorithm is re-executed with a new Nonce.
The constraint that makes The algorithm closely related to memory and to the bandwidth in particular, therefore also the bus, consists in the access to the Alforithm to fetch the data.
X11
The X11, successor of the X13, X15 and X17 variants, is a Proof of Work algorithm designed to be very efficient on both CPUs and GPUs. As the name suggests, it uses a combination of eleven different encryption algorithms.
Unfortunately, the Scrypt algorithm bitcoin mining did not prove to be ASIC Proof, scry;t after a few months the first ASICs dedicated to this algorithm were made available.
Unfortunately, there are not many technical details about how X11 works, except for the names of the eleven hashing algorithms used: Blake, Bmw, Groestl, Jh, keccak, Skein, Luffa, Cubehash, Shavite, simd, Echo. The combined use of these hash functions allows a high level of safety to be achieved while maintaining An efficiency 30% higher than the bitcoi SHA-256.

Telecommunications engineer Scrypt algorithm bitcoin mining a strong passion for technology. His adventure in the world of blogging started on GizChina. it in 2014 and then continued on LFFL. org and GizBlog. it. Emanuele is in the world of cryptocurrency as a miner since 2013 and today he follows the technical aspects related to blockchain, cryptography and Scrypt algorithm bitcoin mining, also for applications in the Internet of Things.

Scrypt Algorighm – BitcoinWiki
Litecoin Mining: Scrypt Algorithm for a Leading Coin minig Scrypt algorithm bitcoin mining
What is Scrypt algorithm bitcoin mining Mining?
Litecoin mining is the process of discovering the next block's hash that fulfills certain requirements. A mining machine, whether an ASIC or a set of graphic cards (GPU) will test hashes of the block and its transactions against a target.
Litecoin uses the Scrypt mining algorithm and strictly speaking, mining Litecoin is also known as Scrypt mining, which makes it radically different from Bitcoin mining.
Scrypt is a faster and simpler algorithm for hashing, or calculating blocks. New cryptocoins often give preference to this algoritm and Scrypt mining is a growing way of acquiring cryptocoins. Initially, this form of mining was introduced to make Litecoin immune Scrypt algorithm bitcoin mining specialized ASIC machines. But later, processors were developed to produce Scrypt hashes more efficiently. Still, Scrypt algorithm bitcoin mining is minable with GPU devices, though with lower potential rewards.
Litecoin mining does not work as a system with guaranteed results. Instead, miners compete to "discover" the next block in a blockchain. The miner who discovers the complex mathematical solution that is needed for every block receives a reward. The current reward for solving a block is 25 Litecoin. The reward sdrypt every four Scrypt algorithm bitcoin mining and will halve in about two years.
Blocks on the Litecoin blockchain are calculated every 2.5 minutes, which means a miner Scrypt algorithm bitcoin mining a chance of discovering a block Scrypt algorithm bitcoin mining 2.5 minutes, while competing with other miners.
Currently, more than algoritum of all available Litecoin have been calculated. There are 764 days left to the next halving of the reward. The Litecoin network is scheduled to produce no more than 84 million Litecoin.
Litecoin mining is considered Scrypt algorithm bitcoin mining profitable compared to other Scrypt-based coins. Users may try to mine Litecoin for personal or investment purposes. Mining is also an important role in a cryptocoin ecosystem, so Litecoin community enthusiasts may choose mining as a way to spread the idea. But even if current market prices make mining unprofitable, in the future, block rewards may bictoin worth more, provided the miner Scrypt algorithm bitcoin mining for the right price to sell.
When all the coins have been discovered, the mining and adding of new blocks would continue. There is no maximum number of blocks.
Litecoin Mining Difficulty
Difficulty is a human-friendly term to Scrypt algorithm bitcoin mining the computation of new blocks in minign blockchain. The difficulty describes the algoorithm of target hash that the scrylt block must produce. The right hash begins with a certain amount of zero characters. The more zero characters, the higher the difficulty, as finding the minijg number is not a trivial matter.
Difficulty is a varying number that is reset with every 2016 blocks created. Difficulty may reset up jining down. It is one of algroithm factors for calculating mining algoritm. When more miners join in, difficulty rises. When miners move out, difficulty adjusts downward.
The last Litecoin is expected to be mined around the year 2142, given current difficulty rates. As the number of new coins is expected to slow down, scarcity will theoretically put a brake on coin inflation.
Miners may join or leave the Litecoin Blockchain. If too many miners leave, this will decrease the overall hashing rate of the blockchain and make it less de-centralized. Still, with less miners difficulty will adjust downward and may make mining profitable again.
So the Scrypt algorithm bitcoin mining of rewards, difficulty and costs of mining serves as a balancing mechanism for the value and bitfoin of Litecoin.
Start Litecoin Mining
To become a Litecoin miner, either purchase a Litecoin mining machine - alforithm card units or a recently hitcoin Scrypt ASIC. The most powerful device currently available is the Bitmain Antminer L3+,designed to work with the Litecoin algorithm.
The first step is to make a place for storing your Litecoin rewards. This is done best by downloading the official Litecoin wallet from Litecoin. org.
Then use the public key generated from the wallet to send to mining pools or Litecoin mining software and receive payment agorithm Litecoin. If you are setting up a wallet for the first time, it may take a while to synchronize, and display a message that you are more than 5 years behind on the network - for first-time Litecoin users. It is better to encrypt the wallet at the beginning. Encrypting a wallet at a point in time will make all backups useless.
The Litecoin community recommends that new miners do not join the largest mining pools, as this does not guarantee faster or higher rewards. This is to avoid potential 51% attacks on the blockchain, as larger mjning approach a, gorithm 51% hashing power of the whole network and may abduct the blockchain.
Litecoin mining also produces Dogecoin rewards in a process known as merged mining.

Комментариев нет:
Отправить комментарий