How specific are ASIC's design? Can they single hash SHA256?
I understand that Bitcoin's ASICs are a highly optimized piece of equipment and, therefore, are also very specific.
My question: are they able to do a single (or triple?) SHA-256 hash at all? And, if so, how competitively would they be with versus a GPU?
mining-hardware hash asic cryptography
add a comment |
I understand that Bitcoin's ASICs are a highly optimized piece of equipment and, therefore, are also very specific.
My question: are they able to do a single (or triple?) SHA-256 hash at all? And, if so, how competitively would they be with versus a GPU?
mining-hardware hash asic cryptography
add a comment |
I understand that Bitcoin's ASICs are a highly optimized piece of equipment and, therefore, are also very specific.
My question: are they able to do a single (or triple?) SHA-256 hash at all? And, if so, how competitively would they be with versus a GPU?
mining-hardware hash asic cryptography
I understand that Bitcoin's ASICs are a highly optimized piece of equipment and, therefore, are also very specific.
My question: are they able to do a single (or triple?) SHA-256 hash at all? And, if so, how competitively would they be with versus a GPU?
mining-hardware hash asic cryptography
mining-hardware hash asic cryptography
asked Feb 17 at 3:24
Tiago Loriato SimõesTiago Loriato Simões
61
61
add a comment |
add a comment |
1 Answer
1
active
oldest
votes
A Bitcoin mining ASIC:
- does not attempt to complete a single hash, rather fragments of two SHA256 compression rounds which is then compared to a target, the result is never returned
- can not accept arbitrary information that is not in the form of a partial SHA256 compression round
So in terms of competitiveness, a CPU can actually complete a SHA256 hash, a mining ASIC can not, which I suppose puts it ahead in this arbitrary race.
Thank, you. However, let's assume I create a (educational) Blockchain that uses single/triple SHA256. Your answers left some doubt in me as to whether the ASICs would have an advantage or not.
– Tiago Loriato Simões
Feb 18 at 4:18
No, you couldn’t do that with modern ASICS.
– Anonymous
Feb 18 at 4:19
add a comment |
Your Answer
StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "308"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});
function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
noCode: true, onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});
}
});
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fbitcoin.stackexchange.com%2fquestions%2f84616%2fhow-specific-are-asics-design-can-they-single-hash-sha256%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
1 Answer
1
active
oldest
votes
1 Answer
1
active
oldest
votes
active
oldest
votes
active
oldest
votes
A Bitcoin mining ASIC:
- does not attempt to complete a single hash, rather fragments of two SHA256 compression rounds which is then compared to a target, the result is never returned
- can not accept arbitrary information that is not in the form of a partial SHA256 compression round
So in terms of competitiveness, a CPU can actually complete a SHA256 hash, a mining ASIC can not, which I suppose puts it ahead in this arbitrary race.
Thank, you. However, let's assume I create a (educational) Blockchain that uses single/triple SHA256. Your answers left some doubt in me as to whether the ASICs would have an advantage or not.
– Tiago Loriato Simões
Feb 18 at 4:18
No, you couldn’t do that with modern ASICS.
– Anonymous
Feb 18 at 4:19
add a comment |
A Bitcoin mining ASIC:
- does not attempt to complete a single hash, rather fragments of two SHA256 compression rounds which is then compared to a target, the result is never returned
- can not accept arbitrary information that is not in the form of a partial SHA256 compression round
So in terms of competitiveness, a CPU can actually complete a SHA256 hash, a mining ASIC can not, which I suppose puts it ahead in this arbitrary race.
Thank, you. However, let's assume I create a (educational) Blockchain that uses single/triple SHA256. Your answers left some doubt in me as to whether the ASICs would have an advantage or not.
– Tiago Loriato Simões
Feb 18 at 4:18
No, you couldn’t do that with modern ASICS.
– Anonymous
Feb 18 at 4:19
add a comment |
A Bitcoin mining ASIC:
- does not attempt to complete a single hash, rather fragments of two SHA256 compression rounds which is then compared to a target, the result is never returned
- can not accept arbitrary information that is not in the form of a partial SHA256 compression round
So in terms of competitiveness, a CPU can actually complete a SHA256 hash, a mining ASIC can not, which I suppose puts it ahead in this arbitrary race.
A Bitcoin mining ASIC:
- does not attempt to complete a single hash, rather fragments of two SHA256 compression rounds which is then compared to a target, the result is never returned
- can not accept arbitrary information that is not in the form of a partial SHA256 compression round
So in terms of competitiveness, a CPU can actually complete a SHA256 hash, a mining ASIC can not, which I suppose puts it ahead in this arbitrary race.
answered Feb 17 at 3:43
AnonymousAnonymous
8,90011028
8,90011028
Thank, you. However, let's assume I create a (educational) Blockchain that uses single/triple SHA256. Your answers left some doubt in me as to whether the ASICs would have an advantage or not.
– Tiago Loriato Simões
Feb 18 at 4:18
No, you couldn’t do that with modern ASICS.
– Anonymous
Feb 18 at 4:19
add a comment |
Thank, you. However, let's assume I create a (educational) Blockchain that uses single/triple SHA256. Your answers left some doubt in me as to whether the ASICs would have an advantage or not.
– Tiago Loriato Simões
Feb 18 at 4:18
No, you couldn’t do that with modern ASICS.
– Anonymous
Feb 18 at 4:19
Thank, you. However, let's assume I create a (educational) Blockchain that uses single/triple SHA256. Your answers left some doubt in me as to whether the ASICs would have an advantage or not.
– Tiago Loriato Simões
Feb 18 at 4:18
Thank, you. However, let's assume I create a (educational) Blockchain that uses single/triple SHA256. Your answers left some doubt in me as to whether the ASICs would have an advantage or not.
– Tiago Loriato Simões
Feb 18 at 4:18
No, you couldn’t do that with modern ASICS.
– Anonymous
Feb 18 at 4:19
No, you couldn’t do that with modern ASICS.
– Anonymous
Feb 18 at 4:19
add a comment |
Thanks for contributing an answer to Bitcoin Stack Exchange!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fbitcoin.stackexchange.com%2fquestions%2f84616%2fhow-specific-are-asics-design-can-they-single-hash-sha256%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown