Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
Home»ETHEREUM NEWS»Mining Problems | Ethereum Foundation Blog
ETHEREUM NEWS

Mining Problems | Ethereum Foundation Blog

By Crypto FlexsJune 9, 20242 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Mining Problems |  Ethereum Foundation Blog
Share
Facebook Twitter LinkedIn Pinterest Email

There are many exciting changes to the Ethereum protocol in the works. This improves system performance, adds additional features such as light client friendliness and a higher level of scalability, and makes it easier to code Ethereum contracts. . In theory, this change is not necessary. The Ethereum protocol is fine as is and could theoretically be released as-is once more clients are built out. Rather, there are changes to make Ethereum better. However, there is a bit more light at the end of the tunnel: Ethereum’s design goal is to decentralize mining. Although there is always the backup option to still use Dagger, slasher or SHA3, it is completely unclear whether any of these algorithms can remain decentralized and mining pool and ASIC resistant in the long run (Slasher is proof-of-stake, so decentralization is guaranteed, but it has its own flaws that make it slightly problematic).

The basic idea of ​​the mining algorithm we are going to use is essentially established. But as with many things, the devil is in the details.

This version of the Ethereum mining algorithm is a Hashcash-based implementation, similar to Bitcoin’s SHA256 and Litecoin’s scrypt. The idea is that the miner computes a pseudo-random number function over blocks and nonces repeatedly, trying a different nonce each time, eventually producing a result where some nonces start with a large number of zeros. The only room for innovation in this kind of implementation is to change functionality. For Ethereum, a high-level outline of the function that takes the blockchain state (defined as the header, current state tree, and all data from the last 16 blocks) is as follows:

  1. Permit h(i) = sha3(sha3(block_header) ++ nonce ++ i) for 0 <= me <= 15

  2. Permit S The blockchain state must be 16 blocks ago.

  3. Permit C(i) Number of transactions in block me Before the block. Permit t(i) be (h(i) mode C(i))first transaction of block me Before the block.

  4. apply T(0), tee(1) … T(15) Sequentially S. However, whenever a transaction leads to contract processing, it (pseudo) makes small random modifications to the code of all affected contracts.

  5. Permit S’ This will be the result state. Permit R Become root’s sha3 S’.

If the r <= 2^256 / differenceThen now A valid nonce.

To summarize in non-programming language, the mining algorithm requires the miner to take a few random transactions from the last 16 blocks, run a calculation that applies them to the state 16 blocks ago with some random modifications, and then get the hash. result. Every new nonce a miner tries, they have to repeat this process again, each time with a new set of random transactions and modifications.

The benefits of this are:

  1. Mining requires the entire blockchain state, essentially requiring all miners to be full nodes. This helps decentralize the network because there is a greater number of full nodes.

  2. Mining pools are now much less useful because every miner must be a full node. In the Bitcoin world, mining pools serve two main purposes. First, mining rewards are distributed equally. Instead of every block giving miners a 0.0001% chance to mine. 16,000rainLoSeedK,allmiddlemeNERSeedallNmiddlemeNEmeNteaoteahourEbloodooLallNdteahourEbloodooLgmeVESteahourEmiddlemeNERallOneAt block 16,000, miners can mine into the pool and the pool gives the miner a 1% chance of receiving a payout. 16,000rainLocK,In ~ErkAnminEIn ~teaoteahourEbloodandLnotdteahourEbloodandLgmeVyesteahourEminuteisallOne1.60. Second, the pool also provides centralized block validation. Instead of running a full Bitcoin client directly, miners can pull block header data from the pool and use that data to mine without actually verifying the block themselves. With this algorithm, the second claim is debatable and the first concern can be appropriately satisfied through a P2P pool that leaves a significant portion of the network hash power uncontrolled by a centralized service.

  3. By definition they are almost ASIC resistant. Because the EVM language is Turing-complete, any kind of computation that can be performed in a regular programming language can be encoded in EVM code. Therefore, an ASIC that can run both EVMs is necessarily an ASIC for generalized computation, i.e. a CPU. This also has similar social benefits to Primecoin. The effort spent building an EVM ASIC also has the side benefit of building hardware to make the network faster.

  4. Although there is no “good” verification formula that can be run within EVM code, the algorithm can be verified relatively quickly computationally.

However, several major challenges still remain. First, it is not entirely clear whether a system that selects random transactions actually requires miners to use the entire blockchain. Ideally, blockchain access is random. In this setup, a miner holding half of the blockchain will succeed on only about 1 in 216 nonces. But in reality, 95% of all transactions will likely use 5% of the blockchain. In these systems, a node with 5% memory only suffers a slowdown penalty of about 2x.

Second, but more importantly, it is difficult to say how optimized EVM miners can be. The algorithm definition above asks miners to make “random minor modifications” to the contract. This part is important. Here’s why: Most transactions have outcomes that are independent of each other. Transactions may not have overlapping formats such as “A sends to B”, “C sends to D”, “E sends to contract F affecting G and H”, etc. So, without random modifications, the EVM miner rarely needs to actually perform much computation. The calculation is performed only once, and the miner pre-calculates the delta, stores it, and applies it immediately. Random modifications mean that miners actually have to perform new EVM calculations every time the algorithm runs. However, this solution itself is incomplete in two ways. First of all, random modifications can easily cause very complex and complex calculations to simply terminate prematurely, or at least have optimizations that are very different from those applied to standard transactions. Second, mining algorithms may intentionally skip complex contracts in favor of simple or easily optimizable contracts. There are heuristics for solving both problems, but it is not entirely clear what exactly these heuristics are.

Another interesting thing that favors this type of mining is that even if optimized hardware miners emerge, the community can work together to essentially change the mining algorithm by “poisoning” the transaction pool. Engineers can analyze existing ASICs, determine what the optimizations are, and dump transactions on the blockchain for which those optimizations are not working. If 5% of all transactions are effectively tainted, the speed of an ASIC cannot be improved by more than 20x. The good thing is that there is a reason why people pay transaction fees for this. Each individual ASIC company has an incentive to poison its competitors’ wells.

These are all challenges we will be focusing our efforts on in the coming months.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

This Is Fine (Until the Grant Runs Out)

March 11, 2026

Khalsi sued for refusing prediction market payments after Iranian leader’s death

March 7, 2026

Bitcoin rose amid Iranian volatility as IBIT recorded one of the biggest inflow days of the quarter.

March 3, 2026
Add A Comment

Comments are closed.

Recent Posts

This Is Fine (Until the Grant Runs Out)

March 11, 2026

Ether Funds Turn Negative, But Bears Still Retain Control: Why?

March 11, 2026

Why El Salvador Is Becoming A Global Crypto Licensing Hub (and How Your Company Can Benefit)

March 10, 2026

Will there be a big rebound in $PEPE in 2026?

March 10, 2026

CoinPoker Debuts New App With Rake Free Poker, Signs Abby Merk And Papo MC

March 10, 2026

Strengthening Digital Trust In The Crypto Era

March 9, 2026

BTC Markets aims to license RWA trading amid tokenization wave. BTC Markets aims to license RWA trading amid tokenization boom. BTC Markets is eyeing RWA trading licenses as tokenization surges. BTC Markets Seeks RWA Trading License Amid Tokenization Wave

March 9, 2026

SIGN surged more than 100% as Sign Global’s pivotal role in sovereign digital infrastructure was revealed.

March 9, 2026

Startup StarCloud Plans First Bitcoin Mining Satellite in Low Earth Orbit

March 8, 2026

Omnipair Loan Audit Summary – Ackee Blockchain

March 8, 2026

Bitcoin Price Rally Slows, Consolidation Signals Move to Next Stage

March 8, 2026

Crypto Flexs is a Professional Cryptocurrency News Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of Cryptocurrency. We hope you enjoy our Cryptocurrency News as much as we enjoy offering them to you.

Contact Us : Partner(@)Cryptoflexs.com

Top Insights

This Is Fine (Until the Grant Runs Out)

March 11, 2026

Ether Funds Turn Negative, But Bears Still Retain Control: Why?

March 11, 2026

Why El Salvador Is Becoming A Global Crypto Licensing Hub (and How Your Company Can Benefit)

March 10, 2026
Most Popular

The Daily: Tornado Cash co-founder’s motion to dismiss rejected, Lummis says Republican Senate will benefit digital assets, Bitcoin ETF will see biggest inflows since July

September 28, 2024

AI-based tools improve climate resilience through advanced flood modeling.

January 16, 2025

The tethers supports XAUT Stablecoin of $ 770,000,000.

April 29, 2025
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2026 Crypto Flexs

Type above and press Enter to search. Press Esc to cancel.