CryptoNight is a proof-of-work algorithm that mixes graphics processing unit (GPU) and central processing unit (CPU) mining to create a system resistant to both application-specific integrated circuits (ASICs) and fast memory-on-chip devices
Questions tagged [cryptonight]
73 questions
19
votes
6 answers
Is Monero amenable to ASIC mining?
Is Monero ASIC resistant? If not, are there already people out there running on ASICs?
kenorb
- 1,573
- 2
- 15
- 25
19
votes
2 answers
Where can I find a description of the CryptoNight hash algorithm?
Where can I find a description of the CryptoNight hash algorithm?
Both a thorough and ELI5 description of the hash algorithm would be appreciated
Susan
- 1,428
- 1
- 16
- 19
16
votes
3 answers
Is it better to mine with a CPU or GPU
"The proof-of-work algorithm, CryptoNight, is AES-intensive and
"memory heavy", which significantly reduces the advantage of GPU over
CPU."
https://en.wikipedia.org/wiki/Monero_(cryptocurrency)
Does this mean that it is generally more…
Lumo5
- 745
- 2
- 7
- 9
15
votes
2 answers
What is the difference between CryptoNote and CryptoNight?
I saw some mining software labelled as CryptoNight miners and they have XMR (Monero) in their list. Many other CryptoNote mining software also has XMR in their list. What is the case? And while adding some tags below I saw CryptoNight-Lite. What are…
GypsyCosmonaut
- 387
- 3
- 12
12
votes
2 answers
Mining Monero with Pencil and Paper
People have successfully performed SHA-256 hashing with pencil and paper
If I wanted to perform the CryptoNight PoW by hand how would I do so?
Are there any PoW instructions that a human with a pencil, paper and enough patience could follow? What…
Susan
- 1,428
- 1
- 16
- 19
11
votes
1 answer
Which reasons were discussed for potentially changing the proof-of-work algorithm?
Which reasons were discussed for potentially changing the proof-of-work algorithm to something else in the future (Cuckoo cycle in particular)?
binaryFate
- 594
- 2
- 8
10
votes
1 answer
How secure is CryptoNight?
Has any research been done on CryptoNight? How secure is it, in terms of having a flaw that would allow PoWs to be produced free or cheaply, independent of difficulty?
Christopher King
- 3,120
- 14
- 65
10
votes
3 answers
Energy consumed to protect the Monero network
Based on typical Monero mining equipment used today, approximately how many Kilowatt-hours (kWh) of electricity are consumed each day in by computers running the Monero cryptonight PoW mining algorithm?
Based on global average energy costs and the…
Lars Gustafson
- 211
- 1
- 5
9
votes
2 answers
CryptoNote features in other cryptocurrencies
How many CryptoNote based currencies exist today?
Have ring signatures appeared in any cryptocurrencies that are not based on CryptoNote?
How many CryptoNote coins are not using a CryptoNight based PoW?
Luke
- 325
- 1
- 4
9
votes
1 answer
How does CryptoNight "depend on all the previous blocks"?
Originally, I thought the CryptoNight puzzle was similar to the SHA2 puzzle, with a more exotic hash function replacing SHA2. In other words, the puzzle was essentially H(prev||nonce) < diff, but with H being the slow_hash in the CryptoNote…
Ian MathWiz
- 211
- 1
- 5
9
votes
2 answers
CryptoNight-Lite PoW modifications in Aeon
What PoW modifications are contained in CryptoNight-Lite as implemented by Aeon? How much faster is blockchain synchronization because of these modifications compared to standard CryptoNight?
What security concerns if any do these modifications…
studycrypto
- 2,083
- 16
- 27
6
votes
1 answer
Is CryptoNight the hash function which plays the role of the "random oracle"?
Is CryptoNight the hash function which plays the role of the "random oracle" in the random oracle model under which certain properties of CryptoNote are mathematically proven in the original paper? Or am I confusing concepts?
If I'm confusing…
user1633011
- 111
- 2
5
votes
1 answer
Monero Pool job contents, blob length
I am trying to understand the contents, their meaning and their volatility of the job we receive from Monero pool. For example
data from pool:…
Rahul
- 105
- 4
5
votes
2 answers
Monero Hash, how does it work, C++ basisc
I am trying to understand xmr-stak miner program. I have understood most of it but having hard time visualizing some pointer manipulation in below code. Its been over 10 years for me to go through any CPP program, any help is apprenticed.
So the…
Rahul
- 105
- 4
5
votes
1 answer
Cryptonote SHA3 bigger than 64byte? (Scratchpad Initialization)
The cryptonote whitepaper says
First, the input is hashed using Keccak [KECCAK] with parameters b =
1600 and c = 512. [..]
That's nothing else as hashing the input with SHA3. The size of a SHA3 hash is 512 bit = 64 byte. The paper…
shortcryptoquestion
- 53
- 3