Bitcoin Forum
May 09, 2024, 10:23:07 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: PoW Algorithms  (Read 231 times)
PixL (OP)
Newbie
*
Offline Offline

Activity: 5
Merit: 0


View Profile
May 16, 2019, 08:53:37 AM
 #1

Hi everyone,

For a study purpose, I would like to know which algorithm are compatible with the Proof of Work.
If you know an existing list of it or if you know some of it, your knowledge would be much appreciated.

Thank you for your help,

PixL
1715293387
Hero Member
*
Offline Offline

Posts: 1715293387

View Profile Personal Message (Offline)

Ignore
1715293387
Reply with quote  #2

1715293387
Report to moderator
1715293387
Hero Member
*
Offline Offline

Posts: 1715293387

View Profile Personal Message (Offline)

Ignore
1715293387
Reply with quote  #2

1715293387
Report to moderator
1715293387
Hero Member
*
Offline Offline

Posts: 1715293387

View Profile Personal Message (Offline)

Ignore
1715293387
Reply with quote  #2

1715293387
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715293387
Hero Member
*
Offline Offline

Posts: 1715293387

View Profile Personal Message (Offline)

Ignore
1715293387
Reply with quote  #2

1715293387
Report to moderator
1715293387
Hero Member
*
Offline Offline

Posts: 1715293387

View Profile Personal Message (Offline)

Ignore
1715293387
Reply with quote  #2

1715293387
Report to moderator
1715293387
Hero Member
*
Offline Offline

Posts: 1715293387

View Profile Personal Message (Offline)

Ignore
1715293387
Reply with quote  #2

1715293387
Report to moderator
bob123
Legendary
*
Offline Offline

Activity: 1624
Merit: 2481



View Profile WWW
May 16, 2019, 09:03:58 AM
Merited by ABCbits (1)
 #2

This is not that easy to answer.

You need to elaborate what exactly you want to know.

PoW just describes some soft of a crystallographic puzzle which has to be solved.
There are 2 types of PoW:
  • Challenge-Response
  • Solution-verification

Moreover, these variants can be either CPU-bound, memory-bound or network-bound.


If you are now talking about the 2nd type of PoW with CPU-bound functions (like it is the case in bitcoin), you can basically use any hashing algorithm (is this what you meant by "which algorithm"?) you want.


PoW in a centralized environment (e.g. network login via RADIUS server etc.) always uses challenge-response.
Obviously this is completely different from bitcoin mining.

So you really need to be more detailed about what you want to know and the precise use case.

NeuroticFish
Legendary
*
Offline Offline

Activity: 3668
Merit: 6382


Looking for campaign manager? Contact icopress!


View Profile
May 16, 2019, 09:40:28 AM
Merited by Carlton Banks (1), ABCbits (1)
 #3

Since the question is unclear, I'll go on another direction.

If you are interested in which coins' algorithms are PoW and how many mining PoW algorithms exist, you should look at pages like

https://en.bitcoinwiki.org/wiki/Mining_algorithms
http://cryptomining24.net/list-of-cryptocurrencies/
https://www.crocosource.com/coins/algo/

The last list seems more comprehensive, but it also contains PoS mining algorithms, so you'll have to check them and "keep" only the PoW ones.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
HeRetiK
Legendary
*
Offline Offline

Activity: 2926
Merit: 2091


Cashback 15%


View Profile
May 16, 2019, 09:49:11 AM
Merited by ABCbits (1)
 #4

Here's a list of cryptographic hashes that are currently employed by various PoW coins:

https://en.bitcoinwiki.org/wiki/Mining_algorithms

This list is far from complete and to be honest I'm not even sure how current it is, but it should serve as a good starting point.

In general any cryptographic hash function can serve as the basis for a PoW scheme, however not all may be equally suitable. Additionally some coins cycle through cryptographic hash functions (if my memory serves me right, may also have just been a concept) and some coins shift between cryptographic hash functions depending on their emission lifecycle (eg. Grin will be shifting from CuckARoo to CuckAToo [1]).

[1] https://github.com/mimblewimble/docs/wiki/how-to-mine-grin

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
DooMAD
Legendary
*
Online Online

Activity: 3780
Merit: 3116


Leave no FUD unchallenged


View Profile
May 16, 2019, 05:24:07 PM
 #5

Additionally some coins cycle through cryptographic hash functions (if my memory serves me right, may also have just been a concept)

Your memory serves you well.  There was a coin with 6 different hash functions and I had the distinct impression it was mostly a gimmick, as cycling hash functions doesn't guarantee that it's more secure, because security is dependent on other factors too.  But since it sounded like the kind of gimmick others might buy into, I still went ahead and bought some.  Naturally, it tanked and I invested poorly.   Cheesy

As far as I know, it's still traded.  And, chances are, it's likely they're not the only coin doing stuff like that now.  So yep, the on-topic part of the story is that it's definitely possible to cycle hash functions.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
bob123
Legendary
*
Offline Offline

Activity: 1624
Merit: 2481



View Profile WWW
May 17, 2019, 07:37:29 AM
Merited by DooMAD (2), HeRetiK (1)
 #6

Additionally some coins cycle through cryptographic hash functions (if my memory serves me right, may also have just been a concept)

Your memory serves you well.  There was a coin with 6 different hash functions and I had the distinct impression it was mostly a gimmick, as cycling hash functions doesn't guarantee that it's more secure, because security is dependent on other factors too.


IIRC, Verge was using 11 different algorithms which it cycled through.


Fun Fact: This actually was the reason attacker could perform multiple 51%+ attacks on it.

Instead of needing to gain more than 50% of the total hashrate, the attacker got 50%+ hashrate of 2 of those algorithms (the ones with the least miners) and manipulated the blocks that the 'next chosen algorithm' was the other one where they controlled the majority of the hashrate.
In addition to that, i believe, they found another flaw which allowed them to create a block each few seconds (instead of 1 per 1-2 minutes, don't remember exactly what their average block time was).

This combined was like the ultimate MCA which could happen to a crypto currency.

And i believe they didn't even needed the hardware for that, but simply rented the necessary hashrate (i am relatively, but not absolute, sure about that).


So, instead of having a coin which is more secure, they weakened the security by cycling through multiple hashing algorithms.
Their innovative approach to a ASIC-resistant and more secure coin, led them to be a laughingstock for the whole crypto community (without even mentioning that their so-called 'privacy' was basically non-existent).

PixL (OP)
Newbie
*
Offline Offline

Activity: 5
Merit: 0


View Profile
May 17, 2019, 03:29:44 PM
 #7

Well, Thank you all for your answers ! I got what i wanted in thoses links.
Thank you very much !
PixL
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!