Close Menu
    Trending
    • Bitcoin Crash Unlike LUNA & FTX Collapses, Says Glassnode: Here’s Why
    • Tether Pays $300 Million To Settle $4.5B Celsius Claim
    • Critical Warning Concerning Shiba Inu (SHIB) Users: Details
    • The Executive’s 90-Day Plan to Build a Data-Driven Organization
    • Elon Musk Mentions Dogecoin Again — Will DOGE Rally?
    • New GOP Bill Wants to Solidify Trump’s Bitcoin-Friendly 401(k) Order
    • Price Drops and Derivatives Market Cools
    • How are Dogecoin (DOGE) and Ripple (XRP) holding their ground in a Bitcoin (BTC)-driven market? Toobit weighs in
    Simon Crypto
    • Home
    • Crypto Market Trends
    • Bitcoin News
    • Crypto Mining
    • Cryptocurrency
    • Blockchain
    • More
      • Altcoins
      • Ethereum
    Simon Crypto
    Home»Ethereum»Long-Range Attacks: The Serious Problem With Adaptive Proof of Work
    Ethereum

    Long-Range Attacks: The Serious Problem With Adaptive Proof of Work

    Team_SimonCryptoBy Team_SimonCryptoMarch 9, 2025No Comments7 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Our present proof of labor design, blockchain-based proof of work, is the second iteration of our try to create a mining algorithm that’s assured to stay CPU-friendly and proof against optimization by specialised {hardware} (ASICs) in the long run. Our first try, Dagger, tried to take the concept of memory-hard algorithms like Scrypt one step additional by creating an algorithm which is memory-hard to compute, however memory-easy to confirm, utilizing directed acyclic graphs (mainly, bushes the place every node has a number of dad and mom). Our present technique takes a way more rigorous monitor: make the proof of labor contain executing random contracts from the blockchain. As a result of the Ethereum scripting language is Turing-complete, an ASIC that may execute Ethereum scripts is by definition an ASIC for common computation, ie. a CPU – a way more elegant argument than “that is memory-hard so you’ll be able to’t parallelize as a lot”. In fact, there are problems with “effectively, are you able to make particular optimizations and nonetheless get a big speedup”, however it may be argued that these are minor kinks to be labored out over time. The answer can also be elegant as a result of it’s concurrently an financial one: if somebody does create an ASIC, then others could have the inducement to search for kinds of computation that the ASIC can’t do and “pollute” the blockchain with such contracts. Sadly, nonetheless, there’s one a lot bigger impediment to such schemes usually, and one which is sadly to a point basic: long-range assaults.

    An extended-range assault mainly works as follows. In a conventional 51% assault, I put 100 bitcoins right into a recent new account, then ship these 100 bitcoins to a service provider in change for some instant-delivery digital good (say, litecoins). I watch for supply (eg. after 6 confirmations), however then I instantly begin engaged on a brand new blockchain ranging from one block earlier than the transaction sending the 100 bitcoins, and put in a transaction as a substitute sending these bitcoins again to myself. I then put extra mining energy into my fork than the remainder of the community mixed is placing into the principle chain, and ultimately my fork overtakes the principle chain and thereby turns into the principle chain, so on the finish I’ve each the bitcoins and the litecoins. In a long-range assault, as a substitute of beginning a fork 6 blocks again, I begin the fork 60000 blocks again, and even on the genesis block.

    In Bitcoin, such a fork is ineffective, because you’re simply rising the period of time you would want to catch up. In blockchain-based proof of labor, nonetheless, it’s a major problem. The reason being that for those who begin a fork straight from the genesis block, then whereas your mining shall be gradual at first, after a couple of hundred blocks it is possible for you to to fill the blockchain up with contracts which are very simple so that you can mine, however tough for everybody else. One instance of such a contract is just:

    i = 0
    whereas sha3(i) != 0x8ff5b6afea3c68b6cd68bd429b9b64a708fa2273a93ea9f9e3c763257affee1f:
    i = i + 1

    You realize that the contract will take precisely a million rounds earlier than the hash matches up, so you’ll be able to calculate precisely what number of steps and the way a lot gasoline it’s going to take to run and what the state shall be on the finish instantly, however different folks could have no alternative however to truly run by way of the code. An vital property of such a scheme, a essential consequence of the halting problem, is that it’s truly unattainable (as in, mathematically provably unattainable, not Hollywood unattainable) to assemble a mechanism for detecting such intelligent contracts within the common case with out truly operating them. Therefore, the long-range-attacker may fill the blockchain with such contracts, “mine” them, and persuade the community that it’s doing a large quantity of labor when it’s truly simply taking the shortcut. Thus, after a couple of days, our attacker shall be “mining” billions of instances sooner than the principle chain, and thereby shortly overtake it.

    Discover that the above assault assumes little about how the algorithm truly works; all it assumes is that the situation for producing a legitimate block relies on the blockchain itself, and there’s a big selection of variability in how a lot affect on the blockchain a single unit of computational energy can have. One resolution entails artificially capping the variability; that is performed by requiring a tree-hashed computational stack hint alongside the contract algorithm, which is one thing that can’t be shortcut-generated as a result of even when you understand that the computation will terminate after 1 million steps and produce a sure output you continue to have to run these million steps your self to supply the entire intermediate hashes. Nevertheless, though this solves the long-range-attack drawback it additionally ensures that the first computation is just not common computation, however relatively computing tons and plenty of SHA3s – making the algorithm as soon as once more weak to specialised {hardware}.

    Proof of Stake

    A model of this assault additionally exists for naively applied proof of stake algorithms. In a naively applied proof of stake, suppose that there’s an attacker with 1% of all cash at or shortly after the genesis block. That attacker then begins their very own chain, and begins mining it. Though the attacker will discover themselves chosen for producing a block only one% of the time, they will simply produce 100 instances as many blocks, and easily create an extended blockchain in that method. Initially, I believed that this drawback was basic, however in actuality it’s a problem that may be labored round. One resolution, for instance, is to notice that each block should have a timestamp, and customers reject chains with timestamps which are far forward of their very own. An extended-range assault will thus have to suit into the identical size of time, however as a result of it entails a a lot smaller amount of foreign money models its rating shall be a lot decrease. One other different is to require not less than some share (say, 30%) of all cash to endorse both each block or each Nth block, thereby completely stopping all assaults with lower than that % of cash. Our personal PoS algorithm, Slasher, can simply be retrofitted with both of those options.

    Thus, in the long run, it looks as if both pure proof of stake or hybrid PoW/PoS are the best way that blockchains are going to go. Within the case of a hybrid PoW/PoS, one can simply have a scheme the place PoS is used to resolve the difficulty described above with BBPoW. What we’ll go along with for Ethereum 1.0 could also be proof of stake, it may be a hybrid scheme, and it may be boring outdated SHA3, with the understanding that ASICs won’t be developed since producers would see no profit with the approaching arrival of Ethereum 2.0. Nevertheless, there’s nonetheless one problem that arguably stays unresolved: the distribution mannequin. For my very own ideas on that, keep tuned for the subsequent a part of this collection.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    Can Ethereum secure a nation’s identity? Bhutan is betting on it

    October 14, 2025

    Announcing the 2026 EF Internship

    October 14, 2025

    BitMine Scoops Up More Ethereum Amid Market Slump, Holdings Surpass 3 Million ETH

    October 14, 2025

    Has Ethereum Price Reached Its Cycle Top Yet? This Metric Says ETH Might Not Be Done

    October 12, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Categories
    • Altcoins
    • Bitcoin News
    • Blockchain
    • Crypto Market Trends
    • Crypto Mining
    • Cryptocurrency
    • Ethereum
    Archives
    • October 2025
    • September 2025
    • August 2025
    • July 2025
    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    Archives
    • October 2025
    • September 2025
    • August 2025
    • July 2025
    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    Top Posts

    Humanizing the Solana Mainnet Beta Update and its Impact on Network Congestion –

    December 30, 2024

    ad

    About us

    Welcome to SimonCrypto.in, your ultimate destination for everything crypto! Whether you’re a seasoned investor, a blockchain enthusiast, or just beginning your journey into the fascinating world of cryptocurrencies, we’re here to guide you every step of the way.

    At SimonCrypto.in, we are passionate about demystifying the complex world of digital currencies and blockchain technology. Our mission is to provide insightful, accurate, and up-to-date information to empower our readers to make informed decisions in the ever-evolving crypto space.

    Top Insights

    Cardano Community Approves $71M Treasury Spend for Network Upgrades

    August 4, 2025

    ZBD’s SDK Powers Bitcoin Earnings In Mobile Games, Driving 124% Revenue Growth

    September 15, 2025

    Allocation Update: Q1 2023 | Ethereum Foundation Blog

    December 16, 2024
    Categories
    • Altcoins
    • Bitcoin News
    • Blockchain
    • Crypto Market Trends
    • Crypto Mining
    • Cryptocurrency
    • Ethereum
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us
    Copyright © 2024 SimonCrypto All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.