Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • ADOPTION
  • TRADING
  • HACKING
  • SLOT
Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • ADOPTION
  • TRADING
  • HACKING
  • SLOT
Crypto Flexs
Home»ETHEREUM NEWS»Mining Problems | Ethereum Foundation Blog
ETHEREUM NEWS

Mining Problems | Ethereum Foundation Blog

By Crypto FlexsJune 9, 20242 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Mining Problems |  Ethereum Foundation Blog
Share
Facebook Twitter LinkedIn Pinterest Email

There are many exciting changes to the Ethereum protocol in the works. This improves system performance, adds additional features such as light client friendliness and a higher level of scalability, and makes it easier to code Ethereum contracts. . In theory, this change is not necessary. The Ethereum protocol is fine as is and could theoretically be released as-is once more clients are built out. Rather, there are changes to make Ethereum better. However, there is a bit more light at the end of the tunnel: Ethereum’s design goal is to decentralize mining. Although there is always the backup option to still use Dagger, slasher or SHA3, it is completely unclear whether any of these algorithms can remain decentralized and mining pool and ASIC resistant in the long run (Slasher is proof-of-stake, so decentralization is guaranteed, but it has its own flaws that make it slightly problematic).

The basic idea of ​​the mining algorithm we are going to use is essentially established. But as with many things, the devil is in the details.

This version of the Ethereum mining algorithm is a Hashcash-based implementation, similar to Bitcoin’s SHA256 and Litecoin’s scrypt. The idea is that the miner computes a pseudo-random number function over blocks and nonces repeatedly, trying a different nonce each time, eventually producing a result where some nonces start with a large number of zeros. The only room for innovation in this kind of implementation is to change functionality. For Ethereum, a high-level outline of the function that takes the blockchain state (defined as the header, current state tree, and all data from the last 16 blocks) is as follows:

  1. Permit h(i) = sha3(sha3(block_header) ++ nonce ++ i) for 0 <= me <= 15

  2. Permit S The blockchain state must be 16 blocks ago.

  3. Permit C(i) Number of transactions in block me Before the block. Permit t(i) be (h(i) mode C(i))first transaction of block me Before the block.

  4. apply T(0), tee(1) … T(15) Sequentially S. However, whenever a transaction leads to contract processing, it (pseudo) makes small random modifications to the code of all affected contracts.

  5. Permit S’ This will be the result state. Permit R Become root’s sha3 S’.

If the r <= 2^256 / differenceThen now A valid nonce.

To summarize in non-programming language, the mining algorithm requires the miner to take a few random transactions from the last 16 blocks, run a calculation that applies them to the state 16 blocks ago with some random modifications, and then get the hash. result. Every new nonce a miner tries, they have to repeat this process again, each time with a new set of random transactions and modifications.

The benefits of this are:

  1. Mining requires the entire blockchain state, essentially requiring all miners to be full nodes. This helps decentralize the network because there is a greater number of full nodes.

  2. Mining pools are now much less useful because every miner must be a full node. In the Bitcoin world, mining pools serve two main purposes. First, mining rewards are distributed equally. Instead of every block giving miners a 0.0001% chance to mine. 16,000rainLoSeedK,allmiddlemeNERSeedallNmiddlemeNEmeNteaoteahourEbloodooLallNdteahourEbloodooLgmeVESteahourEmiddlemeNERallOneAt block 16,000, miners can mine into the pool and the pool gives the miner a 1% chance of receiving a payout. 16,000rainLocK,In ~ErkAnminEIn ~teaoteahourEbloodandLnotdteahourEbloodandLgmeVyesteahourEminuteisallOne1.60. Second, the pool also provides centralized block validation. Instead of running a full Bitcoin client directly, miners can pull block header data from the pool and use that data to mine without actually verifying the block themselves. With this algorithm, the second claim is debatable and the first concern can be appropriately satisfied through a P2P pool that leaves a significant portion of the network hash power uncontrolled by a centralized service.

  3. By definition they are almost ASIC resistant. Because the EVM language is Turing-complete, any kind of computation that can be performed in a regular programming language can be encoded in EVM code. Therefore, an ASIC that can run both EVMs is necessarily an ASIC for generalized computation, i.e. a CPU. This also has similar social benefits to Primecoin. The effort spent building an EVM ASIC also has the side benefit of building hardware to make the network faster.

  4. Although there is no “good” verification formula that can be run within EVM code, the algorithm can be verified relatively quickly computationally.

However, several major challenges still remain. First, it is not entirely clear whether a system that selects random transactions actually requires miners to use the entire blockchain. Ideally, blockchain access is random. In this setup, a miner holding half of the blockchain will succeed on only about 1 in 216 nonces. But in reality, 95% of all transactions will likely use 5% of the blockchain. In these systems, a node with 5% memory only suffers a slowdown penalty of about 2x.

Second, but more importantly, it is difficult to say how optimized EVM miners can be. The algorithm definition above asks miners to make “random minor modifications” to the contract. This part is important. Here’s why: Most transactions have outcomes that are independent of each other. Transactions may not have overlapping formats such as “A sends to B”, “C sends to D”, “E sends to contract F affecting G and H”, etc. So, without random modifications, the EVM miner rarely needs to actually perform much computation. The calculation is performed only once, and the miner pre-calculates the delta, stores it, and applies it immediately. Random modifications mean that miners actually have to perform new EVM calculations every time the algorithm runs. However, this solution itself is incomplete in two ways. First of all, random modifications can easily cause very complex and complex calculations to simply terminate prematurely, or at least have optimizations that are very different from those applied to standard transactions. Second, mining algorithms may intentionally skip complex contracts in favor of simple or easily optimizable contracts. There are heuristics for solving both problems, but it is not entirely clear what exactly these heuristics are.

Another interesting thing that favors this type of mining is that even if optimized hardware miners emerge, the community can work together to essentially change the mining algorithm by “poisoning” the transaction pool. Engineers can analyze existing ASICs, determine what the optimizations are, and dump transactions on the blockchain for which those optimizations are not working. If 5% of all transactions are effectively tainted, the speed of an ASIC cannot be improved by more than 20x. The good thing is that there is a reason why people pay transaction fees for this. Each individual ASIC company has an incentive to poison its competitors’ wells.

These are all challenges we will be focusing our efforts on in the coming months.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

The Senator responded to Trump’s ‘serious inappropriate’ response to Trump’s world free finance.

May 17, 2025

Openai-Coreweave Deal, Bitcoin Price Steady $ 104K

May 16, 2025

$ 1.2 billion in ETH EXITS exchange

May 16, 2025
Add A Comment

Comments are closed.

Recent Posts

Hong Kong credit card loan decreased in the first quarter of 2025, HKMA

May 17, 2025

Quantum computing vs. bitcoin: Are encryption actually in danger?

May 17, 2025

IoTA supports Australia’s flexible AML/CTF reform.

May 17, 2025

Zimbabwean carbon transaction, zap Africa

May 17, 2025

Solana Whale Stakes $ 50.8 MLN SOL: Why are others doing it safe?

May 17, 2025

Forta and Celo Partnership increase the security of Celo Layer 2.

May 17, 2025

BTC, ETH, XRP, BNB, SOL, DOGE, ADA, Sui, Link, Avax

May 17, 2025

NVIDIA develops AI -centered digital twins for improved CFD simulations.

May 17, 2025

Stable choice for future mining

May 17, 2025

NVIDIA’s CUEMBED improves GPU performance to include inquiry.

May 17, 2025

The Senator responded to Trump’s ‘serious inappropriate’ response to Trump’s world free finance.

May 17, 2025

Crypto Flexs is a Professional Cryptocurrency News Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of Cryptocurrency. We hope you enjoy our Cryptocurrency News as much as we enjoy offering them to you.

Contact Us : Partner(@)Cryptoflexs.com

Top Insights

Hong Kong credit card loan decreased in the first quarter of 2025, HKMA

May 17, 2025

Quantum computing vs. bitcoin: Are encryption actually in danger?

May 17, 2025

IoTA supports Australia’s flexible AML/CTF reform.

May 17, 2025
Most Popular

The Yat Siu X account compromise is likely part of a series of recent hacks: ZachXBT

December 26, 2024

Swell plans a layer 2 ‘re-staking rollup’ with native governance tokens.

March 13, 2024

Google improves NotebookLM with custom audio outlines and business edition

October 19, 2024
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2025 Crypto Flexs

Type above and press Enter to search. Press Esc to cancel.