Bitcoin Forum
November 04, 2024, 10:49:41 PM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Is it possible to solve the mining process differently?  (Read 856 times)
Anynomous (OP)
Newbie
*
Offline Offline

Activity: 11
Merit: 0


View Profile
March 24, 2012, 02:42:38 PM
 #1

Hi there,

As I understood, mining bitcoin means to make SHA256(SHA256(something)). If the result has enough 0's at its beginning, you found the block. In order to be possible to get enough 0's, it is possible to change the nonce (or how it is called) and so change the result consequently.

So, if this is mining, couldn't it be possible to calculate which nonce is needed and then give this result to the pool/network?

I suppose there is something I don't know which makes this impossible and so it would be good to learn it. In the other case, well the question would be to know how long it would take to make such a miner Wink

P.S.: There might be some mistakes in the text, my English is quit bad.
wyager
Member
**
Offline Offline

Activity: 98
Merit: 10



View Profile
March 24, 2012, 11:43:06 PM
 #2

The only way to calculate which nonce is needed is to try every single nonce until you get one that works. That's the point of the hashing algorithm.


If we could do what you said, that would mean the hashing algorithm had been broken.

OTC-WoT: 1BWF66DuVqBCSFksUgkLtdYmHucpBgPmVm
Nancarrow
Hero Member
*****
Offline Offline

Activity: 492
Merit: 503


View Profile
March 24, 2012, 11:44:24 PM
 #3

I'm sure that we've ALL tried to find a shortcut to brute-forcing sha256(sha256(hdr-with-nonce)) as soon as we discover bitcoin mining - I know I have anyway. But inverting the process is "computationally infeasible" - google that phrase - and the guys who use phrases like that have brains the size of beachballs.

But by all means have a go at proving P=NP... hey you just might manage it! If you do, let me know how you did it and I'll pay you 100 BTC. Doesn't that sound nice?

If I've said anything amusing and/or informative and you're feeling generous:
1GNJq39NYtf7cn2QFZZuP5vmC1mTs63rEW
DeathAndTaxes
Donator
Legendary
*
Offline Offline

Activity: 1218
Merit: 1079


Gerald Davis


View Profile
March 25, 2012, 01:21:18 AM
 #4

hashing algorithms are designed to be "trap door" functions.  That is they are designed to work only one way. 

plaintext -> hash = very easy
plaintext <- hash = impossible (technically the term is infeasible)

When designing and validating a hash function researchers are looking to ensure that given a hash there is clue as to what plaintext generated it, no signature, nothing that narrows down the search space.

If you could do what you suggest then SHA-256 is broken and useless as a cryptographic hash.  Forget Bitcoin it has ramifications for everything from passwords lists to vpn to digital signatures.   The entire global cryptographic community has been looking for flaws in the algorithm for a decade.  I doubt you will find what they haven't.  The cryptographer who breaks SHA-256 will be famous (well at least in crypto-nerd circles Smiley ).
Anynomous (OP)
Newbie
*
Offline Offline

Activity: 11
Merit: 0


View Profile
March 25, 2012, 10:30:27 AM
 #5

A well ...
After looking up, what the algorithm exactly is, I have my doubts if you can even find ANY solution to the algorithm ...

One other question:
What do I find in the hashed string?
Meni Rosenfeld
Donator
Legendary
*
Offline Offline

Activity: 2058
Merit: 1054



View Profile WWW
March 25, 2012, 10:47:07 AM
 #6

hashing algorithms are designed to be "trap door" functions.  That is they are designed to work only one way.
A Trapdoor function is not the same as a One-way function. The difference is that with a trapdoor function, there is some secret which, if known, allows you to compute any inverse you want of the function. If SHA-256 was a trapdoor function, it would mean that someone who knows its secret would be able to find blocks effortlessly.

1EofoZNBhWQ3kxfKnvWkhtMns4AivZArhr   |   Who am I?   |   bitcoin-otc WoT
Bitcoil - Exchange bitcoins for ILS (thread)   |   Israel Bitcoin community homepage (thread)
Analysis of Bitcoin Pooled Mining Reward Systems (thread, summary)  |   PureMining - Infinite-term, deterministic mining bond
DeathAndTaxes
Donator
Legendary
*
Offline Offline

Activity: 1218
Merit: 1079


Gerald Davis


View Profile
March 25, 2012, 02:28:20 PM
 #7

I stand corrected.  Good to know.
5850Guy
Newbie
*
Offline Offline

Activity: 28
Merit: 0



View Profile
April 05, 2012, 11:56:31 PM
 #8

hashing algorithms are designed to be "trap door" functions.  That is they are designed to work only one way.
A Trapdoor function is not the same as a One-way function. The difference is that with a trapdoor function, there is some secret which, if known, allows you to compute any inverse you want of the function. If SHA-256 was a trapdoor function, it would mean that someone who knows its secret would be able to find blocks effortlessly.

Oh snap!  That would be bad. 

I'm always impressed how well Satoshi designed BitCoin.  There is a lot of good security in it.
madcoweater
Newbie
*
Offline Offline

Activity: 7
Merit: 0


View Profile
April 06, 2012, 01:17:28 AM
 #9

There are no (publicly) known ways to cheat the system. It is possible that one exists, but not very likely. SHA256 has been around for a long time and has not been exploited (yet).
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!