Finance:Equihash

From HandWiki
Revision as of 19:07, 5 February 2024 by BotanyGa (talk | contribs) (fixing)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Equihash is a memory-hard Proof-of-work algorithm introduced by the University of Luxembourg's Interdisciplinary Centre for Security, Reliability and Trust (SnT) at the 2016 Network and Distributed System Security Symposium. The algorithm is based on a generalization of the Birthday problem which finds colliding hash values. It has severe time-space trade-offs but concedes vulnerability to unforeseen parallel optimizations.[1] It was designed such that parallel implementations are bottle-necked by memory bandwidth in an attempt to worsen the cost-performance trade-offs of designing custom ASIC implementations. ASIC resistance in Equihash is based on the assumption that commercially-sold hardware already has quite high memory bandwidth, so improvements made by custom hardware may not be worth the development cost.[citation needed]

General

Equihash was proposed by Alex Biryukov and Dmitry Khovratovich as part of the University of Luxembourg research group CryptoLUX. It was introduced at the Network and Distributed System Security Symposium 2016 in San Diego. Notable blockchain-based projects such as ZCash, BitcoinZ, Horizen, Aion, Hush, and Pirate Chain have integrated Equihash for reasons such as security, privacy, and ASIC miner resistance.[citation needed]

The manufacturer Bitmain has succeeded in optimizing the processing of Zcash's Equihash-200,9 with an ASIC.[2]

Specification

Equihash has three parameters – [math]\displaystyle{ n }[/math], [math]\displaystyle{ k }[/math], and [math]\displaystyle{ d }[/math] – which determine the algorithm's time and memory requirements. The time complexity is proportional to [math]\displaystyle{ 2^{\frac{n}{k+1}+d} }[/math]while the memory complexity is proportional to [math]\displaystyle{ 2^{k+\frac{n}{k+1}} }[/math]. The algorithm is often implemented with [math]\displaystyle{ d = 0 }[/math] (using an alternative method of controlling the effective difficulty).[citation needed]

The problem in Equihash is to find distinct, [math]\displaystyle{ n }[/math]-bit values [math]\displaystyle{ i_1, i_2, ..., i_{2^k} }[/math] to satisfy [math]\displaystyle{ H(i_1) \oplus H(i_2) \, \oplus \, ... \, \oplus \, H(i_{2^k}) = 0 }[/math] such that [math]\displaystyle{ H(i_1 \parallel i_2 \parallel \, ... \, \parallel i_{2^k} ) }[/math] has [math]\displaystyle{ d }[/math] leading zeros, where [math]\displaystyle{ H }[/math] is a chosen hash function.[1] In addition, there are "algorithm binding conditions" which are intended to reduce the risk of other algorithms developed to solve the underlying birthday problem being applicable. A memory-less verification requires [math]\displaystyle{ 2^k }[/math]hashes and XORs.[citation needed]

Memory-hardness and time-space tradeoffs

It is proposed that the puzzle in Equihash be solved by a variation of Wagner's algorithm for the generalized birthday problem. (Note that the underlying problem is not exactly the Generalized Birthday Problem as defined by Wagner, since it uses a single list rather than multiple lists.) The proposed algorithm makes [math]\displaystyle{ k }[/math] iterations over a large list.[1][3] For every factor of [math]\displaystyle{ \frac{1}{q} }[/math] fewer entries per list, computational complexity of the algorithm scales proportional to [math]\displaystyle{ q^{\frac{k}{2}} }[/math] for memory-efficient implementations. Alcock and Ren[4] refute Equihash’s security claims, concluding that no tradeoff-resistance bound is in fact known for Equihash.

Usage

The cryptocurrency Zcash implements Equihash with [math]\displaystyle{ n=200 }[/math] and [math]\displaystyle{ k=9 }[/math].

The cryptocurrency BitcoinGold implements Equihash with [math]\displaystyle{ n=144 }[/math] and [math]\displaystyle{ k=5 }[/math].

See also

References

  1. 1.0 1.1 1.2 Biryukov, Alex; Khovratovich, Dmitry (2017). "Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem: Open Review". Ledger 2. doi:10.5195/ledger.2017.48. https://ledger.pitt.edu/ojs/index.php/ledger/article/view/48. Retrieved 7 October 2018. 
  2. Dölle, Mirko (June 26, 2018). "End of the graphics card era: 8000 ASIC Miners for Zcash, Bitcoin Gold & Co." (in de). https://www.heise.de/newsticker/meldung/Ende-der-Grafikkarten-Aera-8000-ASIC-Miner-fuer-Zcash-Bitcoin-Gold-Co-4091821.html. 
  3. Wagner, David (2002), "A Generalized Birthday Problem" (in en), Advances in Cryptology — CRYPTO 2002, Lecture Notes in Computer Science, 2442, Springer Berlin Heidelberg, pp. 288–304, doi:10.1007/3-540-45708-9_19, ISBN 9783540440505 
  4. Alcock, Leo; Ren, Ling (November 3, 2017). "A Note on the Security of Equihash". 2017 ACM SIGSAC Conference on Computer and Communications Security. Dallas, TX, USA: ACM. doi:10.1145/3140649.3140652. https://dl.acm.org/doi/10.1145/3140649.3140652. 

External links