Cats and Hash Algorithms

Cats and Hash Algorithms


82fac8f3c91fc3f22e94e42994eff86a7aa57ff0c4179d298717c08ed09440f2.png

 

Among all the animals domesticated by mankind over the last 15,000 years, the domestic cat is one of the few that is not fully domesticated (with the exception of Garfield, who looks like a human!).
Cats are feline creatures with their own temperament, unique humor and specific way of acting. Unlike dogs, where you can expect some linear behavior from everyone, each cat, on the contrary, has its own way, its owner and its space.

They always know the owner's weakness to draw attention to something the cat needs or wants. in fact, it looks more like the cat is the owner and the human is her pet!

Mining algorithms follow a similar behavior: they treat randomness and behavior specific to each blockchain, each coin and each miner, in addition to taking more or less processing, memory and/or energy.

Below, have a try to explain some concepts and currencies, to know how the kittens (hashing algorithms) behave:

A common concept is the H/s , or hashrate per second. This unit determines how fast, for simple explanation, how many "hashes" per second are decoded, are decrypted. Keep in mind that every protocol, every discovery strategy has this principle as the key to mining.

What changes, from one algorithm to another, is in the technique of using the hardware, the difficulty of mining and the energy expenditure for its execution;

Each cryptocurrency, therefore, uses its specific encryption algorithm or uses an existing algorithm, but changing the type of hardware need: this search aims to improve efficiency through the equipment used.

The mining equipment who decrypts: ensures the blockchain works!!

Another aspect of the blockchain is its ability to resist attacks and, in this way, prevent equipment from working to destroy the system instead of mining.

They are the ones who, processing transactions and receiving rewards in the form of coins of a particular cryptocurrency, return the financial return and release coins on the market, when not limited.

The most common algorithms today are: SHA-256, Scrypt, Equihash, Ethash, X11, RandomX, Lyra2Z/Lyra2REv2.

Every time you work with some coins listed here, remember that they exist because of equipment and algorithms. Then you can imagine the type of equipment, if you want to exercise your imagination!

The basic mining process is to find a hash and figure out the mathematical solution to its encryption.

Once the correct hash is found, a new block is generated in the blockchain, which stores information about transactions, the hash of the previous block and the amount received by the miner, roughly.

The decryption (or coin mining) process transforms a set of random data into ordered systematic information, later recorded in the blockchain.


THE MOST FAMOUS: SHA-256 - Bitcoin, limited emission

SHA-256 (SHA - 256-bit Secure Hash Algorithm) is an encryption algorithm that has gained notoriety for Bitcoin. The hash value for SHA-256 based cryptocurrencies is calculated in units of Gigahash per second (GH/s). It takes six to ten minutes to create a block.

In 2001, the NSA (National Security Agency) of the USA developed the SHA-256 algorithm as part of the secure data encryption package.

Most commonly used in some common communication protocols: TLS, SSL, PGP, SSH, built in SHA-256.

Until 2009, common computers were used mineraçãofor mining, per cpu. When it was observed that vector processing could be allocated from the graphics cards, a large mining margin was easily achieved.

Bitcoin is used in the SHA-256 algorithm, as well as other cryptocurrencies, mainly bitcoi derivatives such as: Bitcoin Cash (BCH), Bitcoin SV (BSV), Peercoin (PPC), BitcoinDark (BTCD), Litecoin Cash (LCC)


The counterpoint: Ethash - Ethereum, without emission limitation


Ethash, or Dagger Hashimoto, is a cryptocurrency algorithm developed explicitly for Ethereum mining, primarily developed for card payment machines.

Based on two different algorithms: Dagger and Hashimoto (the name consists of the words hash, shift and modulus), the hashrate of the Ethash algorithm is measured in Megahash per second (MH/s).

Dagger is a cryptocurrency algorithm that needs a video card memory. The principle of its operation is similar to Scrypt, but its performance is higher. This is especially noticeable under conditions of increasing network complexity.

However, Dagger has vulnerabilities, and is only effective when paired with Hashimoto, which does its protection at computational cost.

The Hashimoto algorithm works with I/O operations in a special way. Limits production speed by physically limiting I/O writes.

Hashimoto is a cryptocurrency algorithm that requires a large amount of memory for decryption.

GPU processors are suitable for Ethahs coin mining. The most effective graphics cards are AMD.

However, using Nvidia 10 series video cards brings good profits for miners, it must have high RAM.

Ethash was created for Ethereum, but other currencies use the same strategy: Ethereum Classic (ETC), Ubiq (UBQ), Expanse (EXP), QuarkChain (QKC).


Scrypt = Litecoin

Scrypt is a password-based key derivation function based cryptocurrency mining algorithm used in many cryptocurrencies to protect their systems from massive attacks. Block creation speed on a Scrypt-based blockchain is about 30 seconds.

The hashrate is measured in Megahash per second (MH/s). Scrypt became popular because of the Litecoin cryptocurrency.

The Scrypt algorithm emerged, notably, to take away the bitcoin mining monopoly: the simplicity of the SHA-256 function allowed to automate the mining process.

The main purpose of creating Scrypt was to complicate the block generation mechanism due to the increased resource requirements used in computing operations.

In particular, the amount of RAM is crucial, while the requirements for power consumption and processing power are much lower than in the case of the SHA-256.

Initially, central and graphics processors were used to extract cryptocurrencies based on Scrypt.

The Scrypt mining algorithm is the basis for the following cryptocurrencies: Litecoin (LTC), Dogecoin (DOGE), Redcoin (RED), Viacoin (VIA), Syscoin (SYS).



Equihash

In 2016, on the wave of success of bitcoin, Equihash is tested, downfall of the SHA-3 hash. The first cryptocurrency that used Equihash as a base, in fact, was Zcash.

Building blocks takes 150 seconds and the hash is measured in Megahash per second (MH/s).

The basis of this algorithm is a hash function, based on the anniversary problem principle. It is a mathematical regularity used to calculate probability. The rule says:

"If there are 23 people in a room, what is the probability that at least two of them have a birthday on the same day? Answer: 50%."

Hence, the probability of finding the reference number in the mining process is 2, raised to the power of N and divided by 2.

Equihash needs the amount of RAM and not the speed of processing math calculations.

To mine cryptocurrencies running on Equihash, graphics cards with a minimum memory capacity of 2 GB are used. The most suitable GPU is NVidia.

The most popular cryptocurrencies running on the Equihash algorithm: Zcash (ZEC), Bitcoin Gold (BTG), Komodo (KMD), ZClassic (ZCL), ZenCash (ZEN), Private Bitcoin (BTCP), Ethereum (ETH).



RandomX = Monero, the simplest of coins

Cross-platform Proof of Work Algorithm optimized for general purpose graphics cards (GPUs) and general purpose processors (CPUs).

The main feature of the innovation is the execution of different pieces of code in random order and the loading of the device's memory.

Random X can mine with CPU and GPU (AMD and Nvidia). By using VM strategy, it executes programs in a set of special instructions.

These programs can be converted to processor code on the fly: the output of the executed programs is combined into a 256-bit result using the Blake2b cryptographic hash function.

Most CPU models from Intel and AMD from 2011 run RandomX, which made the Monero very popular and easy to mine.

Cryptocurrencies that use RandomX: Monero (XMR), Quantum Resistant Ledger (QRL).



Lyra2Z/Lyra2REv2 - for use on Cpus, with low power consumption.

Algorithms that use the Blake256 and Lyra2 functions, which change successively. Remarkably developed to focus on older ahrdware, however, with optimization of computational capacity. Older hardware had monoblock integrations, which favors mining.

They are optimized to reduce power consumption when mining on graphics cards.

Lyra2Z/Lyra2REv2 algorithms are very popular for cryptocurrency mining on Nvidia graphics cards, including: Zcoin (XZC), Verge (XVG), Veles (VLS)



Anyway, as cats are special types for special owners, algorithms are special animals for specific mines.

At the top of the discussion is the energy expenditure of each one of them, just as Garfield eats lasagna and creates problems, being a lazy fat cat, some algorithms also eat a lot of electric lasagna.

When trading currencies, if you want to have more "green" attitudes, think of the ones that use less energy! The world and Elon Musk thank you!

How do you rate this article?


17

0

1x0Fx0 - 100
1x0Fx0 - 100

I like to read and to write and to see the life in all. I like to make mathematical analysys and to link with emotional responses, historical reviews and temporal actions. I like the similarity between matrix, SW, ST and the real life. TNKS ALL SUPPORT!


Bull, bear and the weather
Bull, bear and the weather

Understanding and controlling the bull, the bear, the weather and the heart: Reason and emotion. And everything that involves these two criteria within the financial market (traditional and digital). Also hoping to bring graphic and comparative analysis with knowledge of the market, history, philosophy and so on, for those who want to see this incredible web of opportunities to use their capabilities and obtain different gains not only in financial terms.

Send a $0.01 microtip in crypto to the author, and earn yourself as you read!

20% to author / 80% to me.
We pay the tips from our rewards pool.