Questions tagged [cryptonight]

CryptoNight is a proof-of-work algorithm that mixes graphics processing unit (GPU) and central processing unit (CPU) mining to create a system resistant to both application-specific integrated circuits (ASICs) and fast memory-on-chip devices

73 questions
19
votes
6 answers

Is Monero amenable to ASIC mining?

Is Monero ASIC resistant? If not, are there already people out there running on ASICs?
kenorb
  • 1,573
  • 2
  • 15
  • 25
19
votes
2 answers

Where can I find a description of the CryptoNight hash algorithm?

Where can I find a description of the CryptoNight hash algorithm? Both a thorough and ELI5 description of the hash algorithm would be appreciated
Susan
  • 1,428
  • 1
  • 16
  • 19
16
votes
3 answers

Is it better to mine with a CPU or GPU

"The proof-of-work algorithm, CryptoNight, is AES-intensive and "memory heavy", which significantly reduces the advantage of GPU over CPU." https://en.wikipedia.org/wiki/Monero_(cryptocurrency) Does this mean that it is generally more…
Lumo5
  • 745
  • 2
  • 7
  • 9
15
votes
2 answers

What is the difference between CryptoNote and CryptoNight?

I saw some mining software labelled as CryptoNight miners and they have XMR (Monero) in their list. Many other CryptoNote mining software also has XMR in their list. What is the case? And while adding some tags below I saw CryptoNight-Lite. What are…
GypsyCosmonaut
  • 387
  • 3
  • 12
12
votes
2 answers

Mining Monero with Pencil and Paper

People have successfully performed SHA-256 hashing with pencil and paper If I wanted to perform the CryptoNight PoW by hand how would I do so? Are there any PoW instructions that a human with a pencil, paper and enough patience could follow? What…
Susan
  • 1,428
  • 1
  • 16
  • 19
11
votes
1 answer

Which reasons were discussed for potentially changing the proof-of-work algorithm?

Which reasons were discussed for potentially changing the proof-of-work algorithm to something else in the future (Cuckoo cycle in particular)?
10
votes
1 answer

How secure is CryptoNight?

Has any research been done on CryptoNight? How secure is it, in terms of having a flaw that would allow PoWs to be produced free or cheaply, independent of difficulty?
Christopher King
  • 3,120
  • 14
  • 65
10
votes
3 answers

Energy consumed to protect the Monero network

Based on typical Monero mining equipment used today, approximately how many Kilowatt-hours (kWh) of electricity are consumed each day in by computers running the Monero cryptonight PoW mining algorithm? Based on global average energy costs and the…
9
votes
2 answers

CryptoNote features in other cryptocurrencies

How many CryptoNote based currencies exist today? Have ring signatures appeared in any cryptocurrencies that are not based on CryptoNote? How many CryptoNote coins are not using a CryptoNight based PoW?
Luke
  • 325
  • 1
  • 4
9
votes
1 answer

How does CryptoNight "depend on all the previous blocks"?

Originally, I thought the CryptoNight puzzle was similar to the SHA2 puzzle, with a more exotic hash function replacing SHA2. In other words, the puzzle was essentially H(prev||nonce) < diff, but with H being the slow_hash in the CryptoNote…
Ian MathWiz
  • 211
  • 1
  • 5
9
votes
2 answers

CryptoNight-Lite PoW modifications in Aeon

What PoW modifications are contained in CryptoNight-Lite as implemented by Aeon? How much faster is blockchain synchronization because of these modifications compared to standard CryptoNight? What security concerns if any do these modifications…
studycrypto
  • 2,083
  • 16
  • 27
6
votes
1 answer

Is CryptoNight the hash function which plays the role of the "random oracle"?

Is CryptoNight the hash function which plays the role of the "random oracle" in the random oracle model under which certain properties of CryptoNote are mathematically proven in the original paper? Or am I confusing concepts? If I'm confusing…
5
votes
1 answer

Monero Pool job contents, blob length

I am trying to understand the contents, their meaning and their volatility of the job we receive from Monero pool. For example data from pool:…
5
votes
2 answers

Monero Hash, how does it work, C++ basisc

I am trying to understand xmr-stak miner program. I have understood most of it but having hard time visualizing some pointer manipulation in below code. Its been over 10 years for me to go through any CPP program, any help is apprenticed. So the…
Rahul
  • 105
  • 4
5
votes
1 answer

Cryptonote SHA3 bigger than 64byte? (Scratchpad Initialization)

The cryptonote whitepaper says First, the input is hashed using Keccak [KECCAK] with parameters b = 1600 and c = 512. [..] That's nothing else as hashing the input with SHA3. The size of a SHA3 hash is 512 bit = 64 byte. The paper…
1
2 3 4 5