Bitcoin Forum
November 16, 2024, 07:13:46 PM *
News: Check out the artwork 1Dq created to commemorate this forum's 15th anniversary
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: How to change the Hardware miner SHA 256 to scrypt Algorithm  (Read 4186 times)
soepri (OP)
Newbie
*
Offline Offline

Activity: 35
Merit: 0


View Profile
November 26, 2014, 04:08:19 AM
 #1

Sorry in advance if this question does not make sense.

Antminer s3 + = OS Linux version 3:10:12 (XXL @ ubuntu)
Dropbear SSH include.

The question? :
What can we replace Antminer s3 + of the SHA256 algorithm into scrypt Algorithm, (using software CGminer instalation)

thanks a lot Kiss

philipma1957
Legendary
*
Offline Offline

Activity: 4312
Merit: 8856


'The right to privacy matters'


View Profile WWW
November 26, 2014, 04:22:05 AM
 #2

Sorry in advance if this question does not make sense.

Antminer s3 + = OS Linux version 3:10:12 (XXL @ ubuntu)
Dropbear SSH include.

The question? :
What can we replace Antminer s3 + of the SHA256 algorithm into scrypt Algorithm, (using software CGminer instalation)

thanks a lot Kiss



good luck with that.

It would be interesting to see if you could do that.   but lets say you do.    a gpu that would do 600mh for btc would do 500 kh for ltc

so for the sale of argument   lets say you get the s-3 to do 380mh that pulls 350 watts

one 250 usd  antminer would make 750 dollar profit in 90 days.     no one in there right mind would let anyone know they are reprograming the s-3 into a ltc miner.. not when they can make a 750 usd profit on each and every s-3 they have.

▄▄███████▄▄
▄██████████████▄
▄██████████████████▄
▄████▀▀▀▀███▀▀▀▀█████▄
▄█████████████▄█▀████▄
███████████▄███████████
██████████▄█▀███████████
██████████▀████████████
▀█████▄█▀█████████████▀
▀████▄▄▄▄███▄▄▄▄████▀
▀██████████████████▀
▀███████████████▀
▀▀███████▀▀
.
 MΞTAWIN  THE FIRST WEB3 CASINO   
.
.. PLAY NOW ..
-ck
Legendary
*
Offline Offline

Activity: 4284
Merit: 1645


Ruu \o/


View Profile WWW
November 26, 2014, 04:46:30 AM
 #3

No you cannot. ASICs are fixed in design to perform one function and one function only and unless scrypt was built into the design, they will never perform it. Software can't emulate the missing bits either.

Developer/maintainer for cgminer, ckpool/ckproxy, and the -ck kernel
2% Fee Solo mining at solo.ckpool.org
-ck
PuertoLibre
Legendary
*
Offline Offline

Activity: 1890
Merit: 1003


View Profile
November 26, 2014, 05:10:27 AM
Last edit: November 26, 2014, 05:25:07 AM by PuertoLibre
 #4

What happens if you use transforms?

SHA256 circuits can't do anything but SHA256. True.

But is it possible to transform a hash loop from a SHA unit into a useful mathematical process even when it isn't necessarily useful for a SHA256 process?

==================

I know the human brain will automatically scream no, but that automatic response may not always be the case when looked at critically and slowly.

For example, in radio and television, a (cosine? I forget the exact term at the moment) transform is used to convert a TV picture into something easier to transmit and at the end point is then transformed back into another format for display on a TV set.

You have a hashing engine that won't take anything but a SHA256 instruction. Is there any part of the Scrypt algorithm that might benefit (even marginally) from the computation process found in a SHA256 engine? The only idea that comes to mind is invoking a partial transform that is compatible with SHA256 mathematical capability and then using a general processor to wait on the result and finish the rest. I have heard that scrypt uses a simple algorithm that requires memory and high speed access to previous iteration of a result.

http://en.wikipedia.org/wiki/Scrypt#Algorithm

http://www.righto.com/2014/09/mining-bitcoin-with-pencil-and-paper.html
soepri (OP)
Newbie
*
Offline Offline

Activity: 35
Merit: 0


View Profile
November 26, 2014, 05:42:43 AM
 #5

hhehee ok... thanks for reply

thnaks a lot sir..
djm34
Legendary
*
Offline Offline

Activity: 1400
Merit: 1050


View Profile WWW
November 26, 2014, 01:00:58 PM
Last edit: November 26, 2014, 02:00:41 PM by djm34
 #6

What happens if you use transforms?

SHA256 circuits can't do anything but SHA256. True.

But is it possible to transform a hash loop from a SHA unit into a useful mathematical process even when it isn't necessarily useful for a SHA256 process?

==================

I know the human brain will automatically scream no, but that automatic response may not always be the case when looked at critically and slowly.

For example, in radio and television, a (cosine? I forget the exact term at the moment) transform is used to convert a TV picture into something easier to transmit and at the end point is then transformed back into another format for display on a TV set.

You have a hashing engine that won't take anything but a SHA256 instruction. Is there any part of the Scrypt algorithm that might benefit (even marginally) from the computation process found in a SHA256 engine? The only idea that comes to mind is invoking a partial transform that is compatible with SHA256 mathematical capability and then using a general processor to wait on the result and finish the rest. I have heard that scrypt uses a simple algorithm that requires memory and high speed access to previous iteration of a result.

http://en.wikipedia.org/wiki/Scrypt#Algorithm

http://www.righto.com/2014/09/mining-bitcoin-with-pencil-and-paper.html
funny that the question pops up every week. but the answer is simply no.
The analogy with the TV picture example does not work here, the way a TV signal is packed is known and all the element necessary to decode the signal are present.
However the miner does not work that way, it doesn't try to decode a signal. If we keep the TV analogy it is rather trying to find the all the pixel corresponding to an image by looking at a partially filled image and using a very incomplete signal... (or the inverse)
And the only way to do that, is to generate all the possibilities until it finds something which fits both the image and the incomplete signal.
Hopefully for you your TV receptor doesn't do that.

A sha256 miner, is just a pseudo-random generator of sha256 function using as seed the block header (trying to find a solution which match a given target)
So it isn't possible the use on scrypt because a scrypt miner is a pseudo-random generator of scrypt function using as seed the block header.
and the 2 functions have absolutely nothing in common.


djm34 facebook page
BTC: 1NENYmxwZGHsKFmyjTc5WferTn5VTFb7Ze
Pledge for neoscrypt ccminer to that address: 16UoC4DmTz2pvhFvcfTQrzkPTrXkWijzXw
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!