In the intricate matrix of cryptographic hashing, two contrasting paradigms vie for precedence: computational swiftness and resilience against specialized hardware, or ASICs. This study undertakes a meticulous exploration into these dueling priorities, juxtaposing conventional stalwarts like SHA-2 and KECCAK against the newer, ASIC-resistant X series. Leveraging detailed performance metrics and visual analytics, we discern the manifest advantage of SHA-2 and KECCAK in terms of computational alacrity. However, as the paper delves deeper, a compelling narrative unfolds. The deliberate design intricacies of the X series, despite their computational latency, emerge as robust bulwarks against potential centralization threats posed by ASIC miners. These algorithms embody a strategic deceleration, ensuring that the cryptocurrency terrain remains hospitable to a broad diaspora of miners. Through this multifaceted lens, we argue that in the cryptographic domain, raw speed is but one facet of a larger, more nuanced picture. The underlying ethos of decentralization and democratic access must guide our trajectory, even if it comes at the expense of pure efficiency. In essence, this paper endeavors to navigate the delicate balance between rapid computation and the overarching principles of an inclusive digital realm.

Evaluating Hashing Algorithms in the Age of ASIC Resistance

Kuznetsov O.
;
2023-01-01

Abstract

In the intricate matrix of cryptographic hashing, two contrasting paradigms vie for precedence: computational swiftness and resilience against specialized hardware, or ASICs. This study undertakes a meticulous exploration into these dueling priorities, juxtaposing conventional stalwarts like SHA-2 and KECCAK against the newer, ASIC-resistant X series. Leveraging detailed performance metrics and visual analytics, we discern the manifest advantage of SHA-2 and KECCAK in terms of computational alacrity. However, as the paper delves deeper, a compelling narrative unfolds. The deliberate design intricacies of the X series, despite their computational latency, emerge as robust bulwarks against potential centralization threats posed by ASIC miners. These algorithms embody a strategic deceleration, ensuring that the cryptocurrency terrain remains hospitable to a broad diaspora of miners. Through this multifaceted lens, we argue that in the cryptographic domain, raw speed is but one facet of a larger, more nuanced picture. The underlying ethos of decentralization and democratic access must guide our trajectory, even if it comes at the expense of pure efficiency. In essence, this paper endeavors to navigate the delicate balance between rapid computation and the overarching principles of an inclusive digital realm.
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11389/70687
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact