Author

Topic: Requesting technical assessment of blockchain security by multi-PoW coin (Read 737 times)

member
Activity: 96
Merit: 10
esotericnonsense
Note that I have not read about this coin. I am simply going off information in your post.

Numbered for ease of replying.

Here's a little more detail:
  • 1. The five proof of work algorithms are: SHA256d, Scrypt, Skein, Myriad-Groestl, and Qubit.
  • 2. Each algorithm has its own independent difficulty.
  • 3. Any algorithm can find the next block.
  • 4. All the algorithms use the same difficulty adjustment method.
  • 5. On average, each algorithm has the same chance of finding the next block.
  • 6. Each algorithm aims for a block generation time of 2.5 minutes.
  • 7. Over the five algorithms, a block should be found on average every 30 seconds.
  • 8. Each of the five algorithms should find 20% of the total blocks over time

1-4 are axiomatic.

5 seems to rely on difficulty adjustment significantly.
Let's assume difficulty adjusts over a sane interval like 1000-2000 blocks.
I haven't seen any sensible algorithms that aren't vulnerable to timewarp attacks and similar; correct me if progress has been made here.

If one algorithm became under-utilized, its individual difficulty would drop.
Assuming that multiple blocks in a row on the same algorithm are possible (see 3); this means that if one algorithm falls out of favour, it doesn't matter how strong the others are.

At diff adjustment, normalized hashpower of each chain would be roughly equivalent.
Call this 1+1+1+1+1 = total nethash is 5.
If an attacker then popped in with 3x the current hashpower on one algo; the situation would look like this:
4+1+1+1+1 = total nethash is 8; attacker owns 4/8; attacker is in monopoly position; attacker can private mine until next diff adj.\

6-7 are irrelevant.

8 seems like a guess that only makes sense immediately after difficulty adjustment assuming no manipulation.
sr. member
Activity: 448
Merit: 250
Hey guys, I come to you from "that other place" where alternative cryptocurrencies roam (yikes, I know...).

In short, I'm wondering if someone with the right background could provide me with security analysis/assessment of a coin with a different consensus mechanism than Bitcoin.

The scoop: A coin launched back in February called Myriadcoin (if you haven't already noticed my loud signature). It's unique feature is a "multiple proof-of-work" scheme whereby 5 separate algorithms are used to solve blocks rather than the typical 1 algorithm found in Bitcoin, Litecoin, etc.

Here's a little more detail:

  • The five proof of work algorithms are: SHA256d, Scrypt, Skein, Myriad-Groestl, and Qubit.
  • Each algorithm has its own independent difficulty.
  • Any algorithm can find the next block.
  • All the algorithms use the same difficulty adjustment method.
  • On average, each algorithm has the same chance of finding the next block.
  • Each algorithm aims for a block generation time of 2.5 minutes.
  • Over the five algorithms, a block should be found on average every 30 seconds.
  • Each of the five algorithms should find 20% of the total blocks over time

Without any proper analysis available to cite, there is disagreement about how much more or less secure this multi-PoW mechanism is from Bitcoin or any other single-PoW (assuming equal hashrates and the algorithms themselves won't be compromised cryptography-wise).

We have been operating under the assumption that double-spend attacks would require control close to 100% control of at least 3 algos (as Andreas Aantonopoulos has been quoted as saying). Is this accurate or no? What are the different factors that impact how much control of each algo is needed? If the attacker needs significantly less control of perhaps even fewer algos, what can be changed in the source code to combat this "security hole"?

I understand the cost of pulling off an attack is proportional to the overall network hashrate, so while Myriadcoin is still young it is probably still vulnerable and the community is aware of this.

Ultimately I guess I'm looking for an answer for these two scenarios:

1) there is significantly large and equivalent hashrates across the 5 algorithms
2) there is a significant imbalance of total hashrates among the 5 algorithms (e.g. three small, two large).

Thank you for your time.



Jump to: