Sha256d mining
anyone can run software on specialized hardware and become a bitcoin miner. mining software monitors transaction broadcast through P2P network and performs appropriate tasks to process and confirm these transactions. Bitcoin miners can earn transaction fees paid by users to speed up transaction processing and additional bitcoin issued according to fixed formula
new transactions need to be included in a block with mathematical workload proof before they can be confirmed. This kind of proof is hard to generate because it can only be generated by trying billions of calculations per second. Miners need to run these calculations before their blocks are accepted and rewarded. As more people start mining, the difficulty of finding effective blocks will be automatically increased by the network to ensure that the average time to find a block remains at 10 minutes. Therefore, the competition for mining is very fierce, and no indivial miner can control the content contained in the block chain
workload proof is also designed to rely on previous blocks, which forces the time sequence of block chain. This design makes it extremely difficult to cancel previous transactions, because the workload proof of all subsequent blocks needs to be recalculated. When two blocks are found at the same time, the miner will process the first block received, and once the next block is found, it will be transferred to the longest block chain. This ensures that the mining process maintains a global consistency based on processing capacity
bitcoin miners can neither increase their rewards by cheating, nor deal with the fraulent transactions that destroy the bitcoin network, because all bitcoin nodes will reject the blocks containing invalid data that violate the bitcoin protocol rules. Therefore, even if not all bitcoin miners can be trusted, the bitcoin network is still secure
sha256 is an encryption algorithm.
common computer mining methods:
1. Download and install gpu360 miner
2. The software will be set to boot, it is recommended to boot. Because it has a very human function, when you don't use the computer, it will automatically mine, when you use it, it will stop instantly, it will not affect the normal work and use
3. After the software is started, change it to your own mobile phone number. After the software starts, there are three setting options:
4. The first time you start mining, you will test the equipment, and it will test your best mining scheme. It usually takes about ten minutes
5. After testing, it will automatically enter the mining state
6. Click stop and close to minimize to the tray, so that when you don't use the computer, it will automatically open to make money
right click the icon to shut down the software completely
7. Bitcoin earned can be exchanged directly in online stores.
when building bitcoin, Nakamoto wants bitcoin to be a decentralized currency, not only for use and trading, but also for mining. But it backfired. With the increasing value of cryptocurrency such as bitcoin, mining has become an instry. The competition is more and more fierce, and the pursuit of mining computing power is higher and higher. Therefore, from ordinary computer mining, ASIC mining machine and GPU mining machine have evolved
the algorithm of ASIC mining machine is almost sha256, while the algorithm of GPU mining is different. For example, the algorithm of BTG is equihash, and the algorithm of BCD is optimized x13. Although it is not absolute, it can be simply considered that the currency of sha256 algorithm is generally mined by ASIC mining machine. Other algorithms are basically using GPU miner. There are also exceptions. Scrypt's Leyte coin used to be mined by GPU miner, but later scrypt's algorithm was also conquered by ASIC chips, such as ant miner L3 +, which is the ASIC miner used to dig Leyte coin
ASIC miner refers to the miner that uses ASIC chip as the core of computing power. ASIC is the abbreviation of application specific integrated circuit, which is a kind of electronic circuit (chip) specially designed for a specific purpose. Some mining machinery factories have designed ASIC chips specially for computing the sha256 algorithm of bitcoin, and the mining machinery using them is ASIC mining machinery. Because ASIC chip is only built for specific computing, its efficiency can be much higher than that of CPU. For example, the current mainstream ant miner S9 is ASIC miner, which uses 189 ASIC chips, the computing power reaches 13.5th/s, and the power consumption is only 1350W. As a comparison, the computing power of gtx1080ti, the flagship computer graphics card, will not exceed 60mh / s even if it is optimized well. The difference is tens of thousands of times
GPU miner refers to the miner that uses GPU graphics card as the core of computing power. Cryptocurrencies such as Ethereum, bitcoin and diamond use graphics algorithms, so the speed of computing with graphics card will be the highest. Compared with ASIC miner, GPU miner is more well-known, because it is a computer with enhanced graphics card configurationthe purpose of GPU miner is to make money, so we should pursue the power consumption ratio and maximum profit, so we should pay attention to the cost performance. Generally, the medium and high-end positioning graphics cards, such as AMD rx560 and rx570, have high power consumption ratio, which is a good choice for GPU miner. While flagship cards such as gtx1080ti and AMD vega64 have the strongest single card performance, they are not cost-effective in terms of price and power consumption
in addition, the ASIC miner also has some exotic procts, such as the USB miner of burning cat, which is slightly larger than the U disk, and the power consumption is only 2.25w, which is the smallest bitcoin miner at present
< / blockquote >the above quoted digcoin.com - "Introction to mining machinery classification" has many professional terms. I hope it can help you, thank you
top ten Ethereum mining software in 2020
in terms of market value, Ethereum is the second largest cryptocurrency, second only to bitcoin. Ethereum's popularity among the holders has increased rapidly because it can build the whole decentralized ecosystem and applications on top of its blockchain. As Ethereum is friendly to GPU mining, Ethereum is a good choice for PC users (especially those with AMD high-end graphics cards). However, 24ker should also warn readers that at this time point, Ethereum's price is $241, which means that even if you use radon VII (90mh / s), your weekly profit is less than $7, The annual profit is about $339. However, considering the potential value-added space of Ethereum, if the price can return to the healthy range of $500-600, it means that your radon will be back in one year
if you already have Ethereum mining hardware and an effective wallet, all you have to do is to find the best eth mining software, which will help you manage the mining work effectively
in this article, we will introce the features, advantages and compatible operating systems. But before we get there... Let's talk about the basics
why Ethereum
unlike traditional currencies, Ethernet operates on the public ledger system, which makes mining itself the core power of Ethereum network. When miners receive the transaction data sent by other members of the network, they assemble them into a structure called Merkle tree, and then try to find an acceptable hash value
only one hash will be returned for each dataset, and the hash value cannot be used to dece the original data. Its purpose is to effectively ensure that the block information is not tampered with. Moreover, if someone changes even one number in any long transaction string, the output hash value will be completely different, and false transaction or fraud will be eliminated
as you can see, if there is no Ethereum mining, Ethereum network will be paralyzed immediately. Therefore, participating in Ethereum mining is not only the mining revenue, but also the support for the operation and growth of Ethereum
what is mining software< In short, mining software is a program that uses a computer graphics card (GPU) as a resource to solve complex mathematical equations. Once the equation is solved, the data is added to the rest of the blockchain
the mining software will monitor the input and output of the hardware, and display statistical data to you, such as miner speed, fan speed, temperature and hash rate
the Ethereum mining software described in this article can be connected to many available Ethereum mining pools
Ethereum mine pool
Ethereum mine pool is a resource area that is equally distributed and shared among miners. Nowadays, it has become too difficult for a person to dig a mine, so it is necessary to use the way of mining pool to fight in groups
today, Ethereum is one of the most famous choice of Ethereum mines. The pool allows its users to remain anonymous and pay only a small 1% mining fee<
top ten Ethereum mining software:
1-ethminer (Ethereum Royal)
it can be seen from the name that ethminer is specially designed for mining Ethereum, and currently supports Linux, MAC and windows. Make sure to download the version corresponding to the device's operating system
in addition to Ethereum, you can also use ethminer to mine all tokens according to ethash algorithm, including expand, elaism, metaverse, musicoin, Pirl, Ethereum classic, etc< Ethminer is a command line software. This means that you can start it from the Linux console or the windows command prompt, or you can use the windows CMD / batch file or the Linux bash script to create a shortcut to the preset command line<
(2-cgminer)
this program was released in 2011. Because it is compatible with three different mining hardware (ASIC, FPGA and GPU), it is still one of the most popular mining software options. CG miner is an open source Ethereum miner written in C language, and provides support and binary files for openwrt router, RPI, etc
the advantages of cgminer include the ability to match your hash rate with zero latency extension, remote interface function and advanced detection of new blocks. The software can be used for Mac, Linux and windows
3 - Claymore (maximum efficiency)
if you are looking for the most efficient Ethereum mining software, please consider using Claymore's al Ethereum mining machine, which can speed up to any hash rate without sacrificing the mining speed
Claymore recently released v12.0 upgrade, which reces the equipment cost of al mining mode from 2% to 1%. The upgrade also offers 3gb and 2GB cards with zero development costs. However, Claymore al miner can't run on Mac. At present, it can only run on Linux and windows. But it supports both NVIDIA and AMD cards
other coins you can mine with this program include siacoin, lbry, decred and Pascal< If you are not familiar with cryptocurrency mining and are looking for the simplest Ethereum mining software, please check wineth
the software is based on the ethminer that we have just evaluated, but wineth provides users with a more simple and easy to understand GUI, combined with "intelligent" algorithm, which will provide the configuration that can ensure the best performance on the new user's hardware
as can be seen from the name, wineth is only compatible with windows devices, and you can find it in the windows 10 app store.
Sha (secure hash algorithm) is a series of cryptographic hash functions designed by National Security Agency (NSA) and published by National Institute of standards and Technology (NIST). The first member of the family officially named Sha was published in 1993. However, it has now been given an informal name sha-0 to avoid confusion with its successors. Two years later, SHA-1, the successor of the first Sha, was released. There are also four variants that have been released to enhance the scope of output and to change some minor designs: sha-224, SHA-256, sha-384, and sha-512 (sometimes referred to as SHA-2)<
sha-0 and SHA-1
the algorithms originally specified were published in 1993, which are called secure hash standard, FIPS pub 180. This version is now often called & quot; SHA-0" It was withdrawn by NSA soon after its release, and released in 1995 as a revised version of FIPS pub 180-1 (commonly known as & quot; SHA-1") replace. According to NSA, it fixed an error in the original algorithm that would rece password security. However, NSA does not provide any further explanation or proof that the error has been corrected. In 1998, in an attack on sha-0, it was found that this attack was not applicable to SHA-1 - we don't know if this is the error found by NSA, but it may indicate that this correction has improved the security. SHA-1 has been closely examined by the public password community, but it has not been found to be unsafe. It is now considered safe
sha-0 and SHA-1 will generate a 160 bit digest from a message with a maximum size of 2 ^ 64 bits, and then encrypt it based on the similar principle of Ronald L. Rivest, Professor of MIT who designed MD4 and MD5 message digest algorithms<
Cryptanalysis of sha-0
on crypto 98, two French researchers demonstrated an attack on sha-0 (chabaud and joux, 1998): hash collision can be found when the complexity is 2 ^ 61; Less than 2 ^ 80 is an ideal hash function of the same size
in 2004, Biham and Chen discovered the approximate collision of sha-0 - two messages can hash out the same value; In this case, 142 and 160 bits are the same. They also found that sha-0 dropped to 62 bits after 80 full collisions
on August 12, 2004, joux, carribault, lemuet and jalby announced the hash collision of the complete sha-0 algorithm. This is the result of the attack of chabaud and joux. The collision was found to be 2 ^ 51, and it took about 80000 CPU hours to work on a supercomputer with 256 Itanium 2 processors< On August 17, 2004, Wang, Feng, Lai, and Yu announced the preliminary results of attacking MD5, sha-0, and other hash functions at the rump meeting of crypto 2004. Their attack on sha-0 is as complex as 2 ^ 40, which means that their attack results are better than those of joux and others. A brief summary of the rump meeting can be found here, and their discussions in sci.crypt, for example, suggest that people planning to use SHA-1 as a new cryptosystem need to reconsider
longer variants
NIST has released three additional Sha variants, each with a longer message digest. They are named by adding their summary length (in bits) after their original name: & quot; SHA-256", & quot; SHA-384" And & quot; SHA-512" They were published in the draft of FIPS pub 180-2 in 2001, and then passed the review and comments. FIPS pub 180-2, including SHA-1, was released as an official standard in 2002. These new hash functions have not been tested in detail by the public password community like SHA-1, so their password security is not widely trusted. In February 2004, a change notice of FIPS pub 180-2 was issued, and an additional variant was added; SHA-224", The key length required for double key 3DES is defined
Gilbert and handschuh (2003) studied new varieties and found no weaknesses<
shad
shad function is a simple restatement of the same Sha function:
shad-256 (m) = SHA-256 (SHA-256 (m)). It overcomes the problem of extended length attacks
applications
SHA-1, sha-224, SHA-256, sha-384 and sha-512 are all used by the U.S. federal government, which needs secure hash algorithms. They also use other cryptographic algorithms and protocols to protect sensitive unclassified data. FIPS pub 180-1 also encourages private or commercial organizations to use SHA-1 encryption. Fritz chip will probably use SHA-1 hash function to realize digital rights management on personal computers
the first to promote the publication of secure hash algorithm is the combined digital signature standard
Sha hash function has been used as the basis of shacal block cipher algorithm<
description of SHA-1
the pseudocode of SHA-1 algorithm is as follows:
(initialize variables:)
A = H0 = 0x67452301
b = H1 = 0xefcdab89
C = h2 = 0x98badcfe
d = H3 = 0x10325476
e = H4 = 0xc3d2e1f0
(pre processing:)
paddedmessage = (message) append 1
while length (paddedmessage) mod 512 & gt; 448:
paddedmessage = paddedmessage append 0
paddedmessage = paddedmessage append (length(message) in 64-bit format)
(Process the message in successive 512-bit chunks:)
while 512-bit chunk(s) remain(s):
break the current chunk into sixteen 32-bit words w(i), 0 <= i <= 15
(Extend the sixteen 32-bit words into eighty 32-bit words:)
for i from 16 to 79:
w(i) = (w(i-3) xor w(i-8) xor w(i-14) xor w(i-16)) leftrotate 1
(Main loop:)
for i from 0 to 79:
temp = (a leftrotate 5) + f(b,c,d) + e + k + w(i) (note: all addition is mod 2^32)
where:
(0 <= i <= 19): f(b,c,d) = (b and c) or ((not b) and d), k = 0x5A827999
(20 <= i <= 39): f(b,c,d) = (b xor c xor d), k = 0x6ED9EBA1
(40 <= i <= 59): f(b,c,d) = (b and c) or (b and d) or (c and d), k = 0x8F1BBCDC
(60 <= i <= 79): F (B, C, d) = (b XOR C XOR d), k = 0xca62c1d6
e = d
d = C
C = B leftrotate 30
b = a
A = temp
H0 = H0 + a
H1 = H1 + B
h2 = H2 + C
H3 = H3 + d
H4 = H4 + e
digest = hash = H0 append H1 append H2 append H3 append H4
note: FIPS pub 180-1 shows the concept of, The efficiency can be improved by using the following formula:
(0 & lt= i <= 19): f(b,c,d) = (d xor (b and (c xor d)))
(40 <= i <= 59): f(b,c,d) = (b and c) or (d and (b or c)))
2. The website selects a group of encryption algorithm and hash algorithm, and sends its identity information back to the browser in the form of certificate. The certificate contains the website address, encrypted public key, and the certificate authority and other information
3. After the browser obtains the website certificate, the browser should do the following work:
A) verify the validity of the certificate (whether the certificate issuing authority is legal, whether the website address contained in the certificate is consistent with the address being visited, etc.). If the certificate is trusted, a small lock will be displayed in the browser bar, otherwise the certificate will not be trusted
b) if the certificate is trusted or the user accepts an untrusted certificate, the browser will generate a string of random number passwords and encrypt them with the public key provided in the certificate
C) use the agreed hash algorithm to calculate the handshake message, use the generated random number to encrypt the message, and finally send all the previously generated information to the website< After receiving the data from the browser, the website should do the following operations:
A) use its own private key to decrypt the information, take out the password, use the password to decrypt the handshake message from the browser, and verify whether the hash is consistent with that from the browser
b) encrypt a handshake message with a password and send it to the browser
5. The browser decrypts and calculates the hash of the handshake message. If the hash is consistent with the hash sent by the server, the handshake process ends, and then all the communication data will be encrypted by the random password generated by the previous browser and the symmetric encryption algorithm.
Sha is a hash algorithm, not an encryption algorithm. There is no decryption problem
reason:
to decrypt data is to find any source data and generate the same target data
sha256 is basically unbreakable, that is, the "collision" result can not be found (or the probability is very small)
website decryption rules:
the website selects a group of encryption algorithm and hash algorithm from the information sent by the browser, and sends its own identity information back to the browser in the form of certificate. The certificate contains the website address, encrypted public key, and the certificate authority and other information
extended data:
in the process of encryption and decryption, the browser verifies the website:
1. Verify the legitimacy of the certificate (whether the certification authority is legal, whether the website address contained in the certificate is consistent with the address being visited, etc.). If the certificate is trusted, a small lock will be displayed in the browser bar, Otherwise, the certificate will not be trusted
2. If the certificate is trusted or the user accepts the untrusted certificate, the browser will generate a string of random number passwords and encrypt them with the public key provided in the certificate
3. Use the agreed hash algorithm to calculate the handshake message, and use the generated random number to encrypt the message, and finally send all the previously generated information to the website< br />