Cryptographic hash functions are vital security components of current computers. They form a key part of digital signatures, message authentication codes, and other security protocols.
So far, there are four series of cryptographic hash functions generally known as Secure Hash Algorithms (SHA). These are SHA-0 (published in 1993), SHA-1 (published in 1996), SHA-2 (published in 2001), and SHA-3 (published in 2015).
In 2007, the National Institute of Standards and Technology (NIST) opened a public competition to develop new hash functions that would replace SHA-2.
The competition accounted for 51 participants. BLAKE was announced as one of the five finalists in 2010, but lost to Keccak in 2012, which was selected for the SHA-3 algorithm.
Blake256 vs Blake256r14
Blake256 and Blake256r14 are virtually the same, the only difference being their rounds of hashing. The first Blake256 had only 10 rounds of hashing, but this was less secure. Therefore, the rounds of hashing were increased to 14 to improve the security. This birthed Blake256r14 or Blake 14r.
What is Blake256r14
Blake256r14 was constructed based on the Hash Iterative Framework (HAIFA). This framework fixes the security flaws and complexities associated with the Merkle and Damgård hash function. Because it is built on HAIFA, Blake256r14 is easy to analyze. It also increases the security of iterative hash functions. Its 14 rounds of hashing not only improve its security, but its speed.
Being a SHA-3 finalist means that it was reviewed carefully and also brutally attacked by renowned crypto analysts in order to identify its security flaws. Blake256r14 allows efficient hardware implementation leading to stronger proofs necessary for network security.
Blake256r14 and Crypto
Blake256r14 is not used widely as a hashing algorithm in crypto. Only one coin uses this algorithm: Decred.
Currently ranked 83rd by market capitalization, Decred was created in 2016 to foster open governance, community engagements and sustainable funding policies. The project was designed so that the community validates every transaction and modification made to the protocol. This means that even large token holders cannot manipulate the protocol.
The coin uses a hybrid PoW/PoS consensus mechanism. The PoW is used to mine new blocks on the chain, of which miners receive 60% of the reward. The PoS consensus, on the other hand, enables users to participate in a ticket-holder voting system, and offers 30% of the block reward.
Despite the merits of Blake256r14, it is important to note that the algorithm is not ASIC resistant.
ASIC Resistance and its Importance in Crypto
To understand ASIC resistance, we must first go back to the original intent of blockchain technology: decentralization. Blockchain transactions are verified by miners after solving blocks using computational power. Satoshi’s intent was that every miner contributes fairly to the blockchain network, thus creating a purely decentralized system.
In the early days of crypto, mining was done using CPU and GPU hardware (although it is now possible to mine crypto with a mobile phone). As the crypto space gained popularity, top Chinese companies began developing ASIC machines.
ASICs (an acronym for Application Specific Integrated Circuits) dominate the entire Bitcoin network and make it impossible to mine BTC using consumer-grade hardware. This, to some, erases decentralization and defeats Satoshi’s aim of not concentrating power in the hands of one entity.
Since the advent of ASICs, mining algorithms have undergone a series of evolutions so as to resist ASICs. First, there was the SHA256 algorithm for Bitcoin, then Litecoin’s Scrypt algorithm, which was then followed by Dash’s X11 algo and Ethereum’s Ethash.
It is important to note that ASICs themselves are not the problem. They are powerful, energy-efficient, cost-effective systems for crypto mining. As a matter of fact, they are more secure than GPUs. So if ASICs have these advantages, why are they a threat to miners?
Why Miners are Skeptical About ASICs
Because of the amount of power ASICs possess, miners fear that they can be used to initiate a 51% attack. A 51% attack refers to a situation where a miner or group of miners control over 50% of the mining power, computing power or hash rate on a blockchain network. With this control, a miner or a group of miners can block the processing or confirmation of new transactions.
So ASICs in themselves do not centralize the blockchain network. Rather, they can be exploited by corrupt miners to dominate and centralize the network. Cryptocurrencies such as Monero have upgraded their algorithm to be ASIC-resistant, but Decred still maintains its non-ASIC resistant Blake256r14 algorithm.
© 2022 Crypto Caster provides information. CryptoCaster.world does not provide investment advice. Do your research before taking a market position on the purchase of cryptocurrency and other asset classes. Past performance of any asset is not indicative of future results. All rights reserved.