Crypto night miner

crypto night

CryptoNight is a memory hard hash characteristic


CryptoNight was initially designed around 2013 as a part of the choices CryptoNote suite.

One design purpose turned into to make it very pleasant for the choices off-the choices-shelf CPU-s, by using using:

More formidable layout aim became to make it inefficiently computable on ASIC-s. This intention has because failed, because it necessarily happens with “ASIC hard” algorithms. Efficient CryptoNight ASIC become developed in 2017 by means of Bitmain.

Monero inherited CryptoNight as its proof of labor in 2014. Since then Monero slightly evolved the choices algorithm to intentionally wreck compatibility with released ASIC-s. Currently Monero implements CryptoNight v2, a third iteration of unique CryptoNight (v0, v1, v2).

The purpose is to discover small-enough hash¶

In hashing primarily based PoW algorithms the choices aim is to discover small-sufficient hash.

Hash is truly an integer (generally, a very massive integer). Most hashing features bring about 256-bit hashes (integers among zero and a couple of^256). This consists of Bitcoin’s double-SHA-256 and Monero’s CryptoNight.

Miner randomly tweaks input statistics till the choices hash fits under distinct threshold. The threshold (additionally a big integer) is set up together via the community as part of the choices consensus mechanism. The PoW is best taken into consideration legitimate (solved) if hash fits below the brink.

Because hash features are one-way, it isn’t possible to analytically calculate input records that would result in a small-enough hash. The answer need to be brute-pressured through tweaking the enter information and recalculating the choices hash time and again again.

Miners have some areas of flexibility regarding input data – most significantly they can iterate with the nonce value. They even have a strength over which transactions are protected in the block and how they’re put together in a merkle tree.

Cryptographic primitives¶

CryptoNight is based on:

Input records¶

In Monero the choices input to hashing feature is concatenation of:

See get_block_hashing_blob() characteristic to dig in addition.


The article tries to provide reader a high-level knowledge of the choices CryptoNight algorithm. For implementation details refer to CryptoNote Standard and Monero supply code. See references at the bottom.

CryptoNight tries to make memory access a bottleneck for performance (“reminiscence hardness”). It has three steps:

Firstly, the input statistics is hashed with Keccak-1600. This results in two hundred bytes of pseudorandom information (1600 bits == 200 bytes).

These two hundred bytes turn out to be a seed to generate a bigger, 2MB-wide buffer of pseudorandom records, by means of applying AES-256 encryption.

The first 0..31 bytes of Keccak-1600 hash are used as AES key.

The encryption is performed on 128 bytes-lengthy payloads till 2MB is ready. The first payload are Keccak-1600 bytes sixty six..191. The next payload is encryption result of the choices previous payload.

Each 128-byte payload is certainly encrypted 10 instances.

The details are a bit extra nuanced, see “Scratchpad Initialization” in CryptoNote Standard.

The 2nd step is basically 524288 iterations of a simple stateful set of rules.

Each set of rules iteration reads from and writes again to the choices scratchpad, at pseudorandom-however-deterministic places.

Critically, next new release depends on the country prepared via previous iterations. It isn’t always possible to directly calculate kingdom of future iterations.

The specific operations encompass AES, XOR, 8byte_mul, 8byte_add – operations which are CPU-friendly (fairly optimized on cutting-edge CPU-s).

The aim here is to make memory latency the bottleneck in try to near the gap between capacity ASIC-s and standard reason CPU-s.

The very last step (simplifying) is to:

The ensuing 256-bit hash is the final output of CryptoNight algorithm.

Monero particular adjustments¶

This is how Monero network refers to original implementation of CryptoNight.

See the choices supply code diff.

See the choices cause and the choices source code diff.

See the purpose and the supply code diff.


CryptoNight evidence of labor remains one of the maximum arguable factor of Monero.