Ethash

From HandWiki

Ethash is the proof-of-work function in Ethereum-based blockchain currencies.[1] It is a hash function belonging to the Keccak family, the same family which the SHA-3 hash functions belong to. However, Ethash is not a SHA-3 function, and should not be confused with them. Since version 1.0, Ethash has been designed to be ASIC-resistant via memory-hardness (harder to implement in special ASIC chips) and easily verifiable.[2] It also uses a slightly modified version of earlier Dagger[3] and Hashimoto[4] hashes to remove computational overhead.[1][5] Previously referred to as Dagger-Hashimoto, the Ethash function has evolved over time. Ethash uses an initial 1 GB dataset known as the Ethash DAG and a 16 MB cache for light clients to hold. These are regenerated every 30,000 blocks, known as an epoch. Miners grab slices of the DAG to generate mix-hashes using transaction and receipt data, along with a cryptographic nonce to generate a hash below a dynamic target difficulty.[1]

ASIC Miner Controversy

In April 2018, the first ASIC miners for Ethash, the ASIC-resistant hash, were announced by Bitmain.[citation needed] Fear of over-influence from Bitmain and 51% attacks prompted discussions of bricking the devices,[citation needed] forcing ASIC miners into hard-mode mining, or continuing or expediting development and eventual release of Casper. Vitalik Buterin, the co-founder Ethereum, considers ASIC miners to not be a threat to Ethereum.[citation needed] It was decided that Ethereum would switch from its pure proof of work to a hybrid Proof of Work and Proof of Stake scheme called "Casper the Friendly Finality Gadget" (FFG), where every 1 in 50 blocks is created with Proof of Stake for partial finality (the prevention of new forks).[citation needed] On a future hard fork yet to be decided, Ethereum will produce all new blocks with Proof of Stake through a separate design of Casper, known as "Casper the Friendly GHOST" or sometimes "Casper Correct-By-Construction" (CBC)[6], and Ethash will be officially deprecated on the main Ethereum blockchain due to an exponential rise in mining difficulty. Other blockchains utilizing Ethash (including the Ethereum Foundation's Ropsten test network) have not announced plans to deprecate its use.

See also

  • SHA-3 – another Keccak-based hash

References

  1. 1.0 1.1 1.2 "wiki: The Ethereum Wiki". 8 February 2018. https://github.com/ethereum/wiki. Retrieved 8 February 2018. 
  2. Rudlang, Marit (Jun 2017). Comparative Analysis of Bitcoin and Ethereum. Norway: NTNU: Norwegian University of Science and Technology. pp. 52–53. https://brage.bibsys.no/xmlui/bitstream/handle/11250/2451325/17050_FULLTEXT.pdf?sequence=1#page=51. Retrieved 29 September 2018. 
  3. Vitalik Buterin. Dagger: A memory-hard to compute, memory-easy to verify scrypt alternative. Tech Report, hashcash.org website, 2013.
  4. Dryja, Thaddeus. "Hashimoto: I/O bound proof of work". Archived from the original on 2017-08-10. https://web.archive.org/web/20170810043640/https://pdfs.semanticscholar.org/3b23/7cc60c1b9650e260318d33bec471b8202d5e.pdf. 
  5. Tikhomirov, Sergei (17 Feb 2018). "Ethereum: State of Knowledge and Research Perspectives". International Symposium on Foundations and Practice of Security. Lecture Notes in Computer Science 10723 (FPS 2017): 206–221. doi:10.1007/978-3-319-75650-9_14. ISBN 978-3-319-75649-3. https://fps2017.loria.fr/wp-content/uploads/2017/10/19.pdf. Retrieved 29 September 2018. 
  6. Zamfir, Vlad (1 November 2017). "A Template for Correct-by-Construction Consensus Protocols". https://raw.githubusercontent.com/ethereum/research/master/papers/cbc-consensus/AbstractCBC.pdf.