Advertisement
RavenCoin

X16R Whitepaper

Jan 26th, 2018
1,141
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.70 KB | None | 0 0
  1. X16R
  2. ASIC Resistant by Design
  3. Tron Black and Joel Weight
  4.  
  5.  
  6. The history of hashing for cryptocurrencies began with SHA256 for Bitcoin, then Scrypt
  7. for Litecoin, Ethash for Ethereum, X11 for Dash, followed by X13, X15, and X17. X16R
  8. is the next step in this evolution to find a better mining algorithm.
  9.  
  10. The reason for the algorithm changes is to minimize the impact of purpose-built
  11. hardware on the mining ecosystem of the coin. Bitcoin was originally intended to be
  12. mined by computers everywhere. As the value of bitcoin increased, it became
  13. advantageous to mine in parallel on hardware designed for parallel processing, so the
  14. mining moved to Graphics Processing Units (GPUs). As the economic value of mining
  15. further increased, it became economically viable to use programmable hardware in the
  16. form of Field-programmable Gate Arrays (FPGAs), which had an advantage over CPUs
  17. and GPUs. The next step was to build custom chips that are purpose-built for mining.
  18. These Application Specific Integrated Circuits (ASICs) were able to dominate the
  19. competing technologies and made it impractical to mine any other way. The last, and
  20. likely final, iteration for Bitcoin mining is the move to faster and more energy efficient
  21. ASIC hardware.
  22.  
  23. The unfortunate side-effect of this transition to ASIC hardware is the centralization of
  24. mining. While anyone can order these ASICs, there is an advantage to being near the
  25. manufacturing facility as shipping time is reduced. Additionally, access to cheap
  26. electricity is a priority, as the electricity used is the variable cost of the mining operation.
  27. This has led to some centralization of mining in China because of the proximity to ASIC
  28. development and the availability of inexpensive electricity in some provinces.
  29.  
  30. One solution to minimize the impact of ASIC miners is to use a memory intensive
  31. hashing algorithm. This is the approach of Scrypt, used by Litecoin, and Equihash, used
  32. by Ethereum. These two algorithms have reduced the impact of ASICs. While there are
  33. some ASIC miners for Scrypt, the relative advantage over GPUs is negligible. There are
  34. currently no ASIC miners for Equihash.
  35.  
  36. Another approach is to use a sequence of hashing algorithms where the output of one
  37. becomes the input to the next. Dash, formerly DarkCoin, took this approach with their
  38. X11 algorithm. X11 uses eleven chained hashing algorithms in an effort to thwart the
  39. move to ASIC mining.
  40.  
  41. This approach worked for a while, but several manufacturers now produce ASIC miners
  42. for X11. The concept behind X11 can be extended to additional algorithms. For this
  43. reason, some coins use X13, some X15, and even X17 which chains seventeen
  44. hashing algorithms.
  45. https://getpimp.org/what-are-all-these-x11-x13-x15-algorithms-made-of/
  46.  
  47. The fixed order of hashing algorithms lends itself to the construction of ASICs. While
  48. chaining more algorithms together adds difficulty in constructing an ASIC, the X13, X15,
  49. and X17 all use the same ordering of hashing algorithms as the X11. This is likely to
  50. lead to faster manufacturing of ASICs for these algorithms as manufacturers only need
  51. to extend their existing design to accommodate the additional hashing algorithms.
  52.  
  53. The X16R algorithm intends to solve this problem by constantly disrupting the ordering
  54. of the hashing algorithms. The hashing algorithms are the same proven algorithms used
  55. in X15 + SHA512, but the ordering is changed based on the hash of the previous block.
  56.  
  57. This reordering does not make an ASIC impossible to build, but it does require that the
  58. ASIC adapts to additional input, which is more easily accomplished by a CPU or GPU.
  59. The reordering also prevents a simple extension of the current X11 ASICs or future X15
  60. ASICs.
  61.  
  62. The X16R hashing algorithm consists of 16 hashing algorithms operating in chain
  63. fashion with the ordering dependent on the last 8 bytes (16 nibbles) of the hash of the
  64. previous block. The algorithms are as follows:
  65. ======================================
  66. || 0=blake || 8=shavite ||
  67. || 1=bmw || 9=simd ||
  68. || 2=groestl || A=echo ||
  69. || 3=jh || B=hamsi ||
  70. || 4=keccak || C=fugue ||
  71. || 5=skein || D=shabal ||
  72. || 6=luffa || E=whirlpool ||
  73. || 7=cubehash || F=sha512 ||
  74. ======================================
  75. Example:
  76.  
  77. Previous Block Hash:
  78. 0000000000000000007e8a29f052ac2870045ae3970270f97da00919b8e86287
  79.  
  80. The final 8 bytes:
  81. 0x7da00919b8e86287
  82.  
  83. Each hex digit (nibble) determines which algorithm to use next.
  84. cubehash -> shabal -> echo -> blake -> blake -> simd -> bmw -> simd -> hamsi ->
  85. shavite -> whirlpool -> shavite -> luffa -> groestl -> shavite -> cubehash
  86.  
  87. Some of the hash algorithms take longer than others. This time differential tends to
  88. average out across the 16 algorithms while mining each block.
  89.  
  90. The test platform for this mining algorithm is Raven (RVN). Raven was launched on
  91. January 3, 2018, the 9th year anniversary of Bitcoin's launch. Raven changes the
  92. issuance schedule, block time, and mining algorithm.
  93.  
  94. Raven is the reference implementation for X16R, which defines the number of
  95. algorithms, the specific hashing algorithms used, the order of the algorithms, and the
  96. order of and bytes used from the previous block hash.
  97.  
  98. The concepts behind X16R could be extended to include Scrypt, Equihash, and other
  99. ASIC resistant algorithms to continue to allow anyone with an idle computer to
  100. participate in mining with off-the-shelf hardware. The ordering of the algorithms can
  101. easily be changed for each coin in order to dissuade hardware manufacturers from
  102. building ASICs for an entire class of coins as with X11.
  103.  
  104. Source: https://ravencoin.org/wp-content/uploads/2018/01/X16R-Whitepaper-3.pdf
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement