Thursday, October 2, 2025
The BLOCKCHAIN Page
No Result
View All Result
  • Home
  • Cryptocurrency
  • Blockchain
  • Bitcoin
  • Market & Analysis
  • Altcoins
  • DeFi
  • Ethereum
  • Dogecoin
  • XRP
  • Regulations
  • NFTs
The BLOCKCHAIN Page
No Result
View All Result
Home Ethereum

Long-Range Attacks: The Serious Problem With Adaptive Proof of Work

by admin
May 16, 2024
in Ethereum
0
Dodging a bullet: Ethereum State Problems
0
SHARES
2
VIEWS
Share on FacebookShare on Twitter


Our present proof of labor design, blockchain-based proof of work, is the second iteration of our try to create a mining algorithm that’s assured to stay CPU-friendly and proof against optimization by specialised {hardware} (ASICs) in the long run. Our first try, Dagger, tried to take the thought of memory-hard algorithms like Scrypt one step additional by creating an algorithm which is memory-hard to compute, however memory-easy to confirm, utilizing directed acyclic graphs (principally, timber the place every node has a number of dad and mom). Our present technique takes a way more rigorous monitor: make the proof of labor contain executing random contracts from the blockchain. As a result of the Ethereum scripting language is Turing-complete, an ASIC that may execute Ethereum scripts is by definition an ASIC for normal computation, ie. a CPU – a way more elegant argument than “that is memory-hard so you may’t parallelize as a lot”. In fact, there are problems with “nicely, are you able to make particular optimizations and nonetheless get a big speedup”, however it may be argued that these are minor kinks to be labored out over time. The answer can be elegant as a result of it’s concurrently an financial one: if somebody does create an ASIC, then others could have the inducement to search for varieties of computation that the ASIC can’t do and “pollute” the blockchain with such contracts. Sadly, nonetheless, there may be one a lot bigger impediment to such schemes basically, and one which is sadly to a point basic: long-range assaults.

An extended-range assault principally works as follows. In a standard 51% assault, I put 100 bitcoins right into a contemporary new account, then ship these 100 bitcoins to a service provider in alternate for some instant-delivery digital good (say, litecoins). I look ahead to supply (eg. after 6 confirmations), however then I instantly begin engaged on a brand new blockchain ranging from one block earlier than the transaction sending the 100 bitcoins, and put in a transaction as a substitute sending these bitcoins again to myself. I then put extra mining energy into my fork than the remainder of the community mixed is placing into the primary chain, and finally my fork overtakes the primary chain and thereby turns into the primary chain, so on the finish I’ve each the bitcoins and the litecoins. In a long-range assault, as a substitute of beginning a fork 6 blocks again, I begin the fork 60000 blocks again, and even on the genesis block.

In Bitcoin, such a fork is ineffective, because you’re simply rising the period of time you would want to catch up. In blockchain-based proof of labor, nonetheless, it’s a significant issue. The reason being that for those who begin a fork straight from the genesis block, then whereas your mining might be gradual at first, after a couple of hundred blocks it is possible for you to to fill the blockchain up with contracts which might be very straightforward so that you can mine, however troublesome for everybody else. One instance of such a contract is just:

i = 0
whereas sha3(i) != 0x8ff5b6afea3c68b6cd68bd429b9b64a708fa2273a93ea9f9e3c763257affee1f:
i = i + 1

You realize that the contract will take precisely a million rounds earlier than the hash matches up, so you may calculate precisely what number of steps and the way a lot gasoline it would take to run and what the state might be on the finish instantly, however different individuals could have no selection however to really run by means of the code. An essential property of such a scheme, a vital consequence of the halting problem, is that it’s truly unimaginable (as in, mathematically provably unimaginable, not Hollywood unimaginable) to assemble a mechanism for detecting such intelligent contracts within the normal case with out truly working them. Therefore, the long-range-attacker might fill the blockchain with such contracts, “mine” them, and persuade the community that it’s doing an enormous quantity of labor when it’s truly simply taking the shortcut. Thus, after a couple of days, our attacker might be “mining” billions of occasions quicker than the primary chain, and thereby rapidly overtake it.

Discover that the above assault assumes little about how the algorithm truly works; all it assumes is that the situation for producing a sound block relies on the blockchain itself, and there’s a big selection of variability in how a lot affect on the blockchain a single unit of computational energy can have. One resolution entails artificially capping the variability; that is finished by requiring a tree-hashed computational stack hint alongside the contract algorithm, which is one thing that can’t be shortcut-generated as a result of even when you realize that the computation will terminate after 1 million steps and produce a sure output you continue to have to run these million steps your self to provide the entire intermediate hashes. Nevertheless, though this solves the long-range-attack downside it additionally ensures that the first computation just isn’t normal computation, however relatively computing tons and many SHA3s – making the algorithm as soon as once more weak to specialised {hardware}.

Proof of Stake

A model of this assault additionally exists for naively applied proof of stake algorithms. In a naively applied proof of stake, suppose that there’s an attacker with 1% of all cash at or shortly after the genesis block. That attacker then begins their very own chain, and begins mining it. Though the attacker will discover themselves chosen for producing a block just one% of the time, they will simply produce 100 occasions as many blocks, and easily create an extended blockchain in that means. Initially, I believed that this downside was basic, however in actuality it’s a problem that may be labored round. One resolution, for instance, is to notice that each block will need to have a timestamp, and customers reject chains with timestamps which might be far forward of their very own. An extended-range assault will thus have to suit into the identical size of time, however as a result of it entails a a lot smaller amount of forex models its rating might be a lot decrease. One other various is to require at the least some proportion (say, 30%) of all cash to endorse both each block or each Nth block, thereby completely stopping all assaults with lower than that p.c of cash. Our personal PoS algorithm, Slasher, can simply be retrofitted with both of those options.

Thus, in the long run, it looks as if both pure proof of stake or hybrid PoW/PoS are the best way that blockchains are going to go. Within the case of a hybrid PoW/PoS, one can simply have a scheme the place PoS is used to resolve the difficulty described above with BBPoW. What we’ll go along with for Ethereum 1.0 could also be proof of stake, it could be a hybrid scheme, and it could be boring previous SHA3, with the understanding that ASICs won’t be developed since producers would see no profit with the upcoming arrival of Ethereum 2.0. Nevertheless, there may be nonetheless one problem that arguably stays unresolved: the distribution mannequin. For my very own ideas on that, keep tuned for the subsequent a part of this sequence.



Source link

Tags: AdaptiveAttacksLongRangeproblemProofwork
admin

admin

Recommended

Emerging Crypto Pullix (PLX) Takes On Giants Binance (BNB) and Arbitrum (ARB) in Altcoin Race, Analysts Predict 50x

Emerging Crypto Pullix (PLX) Takes On Giants Binance (BNB) and Arbitrum (ARB) in Altcoin Race, Analysts Predict 50x

1 year ago
AI And Blockchain Synergies Mitigate Risk Of Deepfakes In KYC

AI And Blockchain Synergies Mitigate Risk Of Deepfakes In KYC

1 year ago

Popular News

  • What is Velodrome Finance (VELO): why it’s a next-gen AMM

    What is Velodrome Finance (VELO): why it’s a next-gen AMM

    0 shares
    Share 0 Tweet 0
  • Protocol-Owned Liquidity: A Sustainable Path for DeFi

    0 shares
    Share 0 Tweet 0
  • Cryptocurrency for College: Exploring DeFi Scholarship Models

    0 shares
    Share 0 Tweet 0
  • What are rebase tokens, and how do they work?

    0 shares
    Share 0 Tweet 0
  • BLUR Up By 11% Following This Announcement

    0 shares
    Share 0 Tweet 0

Latest

Institutional Moves and $1B Liquidations Shake XRP: Could This Be a Strategic Re-Accumulation Phase?

XRP Price Prediction: CTO Exit and Investor Sell Calls Clash With Bullish $4.70 Target

October 2, 2025
SWIFT Is Planning To Launch Its Own Blockchain Amid Trillion-Dollar Battle, But It’s Not With Ripple

SWIFT Is Planning To Launch Its Own Blockchain Amid Trillion-Dollar Battle, But It’s Not With Ripple

October 2, 2025

Categories

  • Altcoins
  • Bitcoin
  • Blockchain
  • Cryptocurrency
  • DeFi
  • Dogecoin
  • Ethereum
  • Market & Analysis
  • NFTs & Metaverse
  • Regulations
  • XRP

Follow us

Recommended

  • XRP Price Prediction: CTO Exit and Investor Sell Calls Clash With Bullish $4.70 Target
  • SWIFT Is Planning To Launch Its Own Blockchain Amid Trillion-Dollar Battle, But It’s Not With Ripple
  • Are smart gardens viable at home? Here’s how my harvesting journey is going so far
  • Roku’s new Philips TV makes your wall glow in sync with every scene – for a budget price
  • AirPods Pro 3 vs. AirPods Pro 2: I compared the two models, and here’s who should upgrade
  • About us
  • Privacy Policy
  • Terms & Conditions

© 2023 TheBlockchainPage | All Rights Reserved

No Result
View All Result
  • Home
  • Cryptocurrency
  • Blockchain
  • Bitcoin
  • Market & Analysis
  • Altcoins
  • DeFi
  • Ethereum
  • Dogecoin
  • XRP
  • Regulations
  • NFTs

© 2023 TheBlockchainPage | All Rights Reserved