Score:1

Do proof of work hash function arguments have anything in common?

am flag

Some proof of work hashes have a lot of initial zeros. Do the arguments to the hash functions giving these zero containing hashes have anything in common, or are they stochastic?

What I am looking for is if there are any ways to choose the hash function argument distributions in order to improve the rate of initial zeros hashes.

Since there are so many initial zeros hashes found in cryptocurrency mining it might be possible to make an empirical study.

kelalaka avatar
in flag
What is applied to SHA-1 here [How to get an output of SHA-1 with the first 2-bit are zeros?](https://crypto.stackexchange.com/q/83224/18298) is true for any good cryptographic hash function...
Score:1
in flag

The reason why these cryptographically secure hashes are chosen is because they provide randomized output. You might find ways to calculate the best input to calculate a number of zeros for non-cryptographically secure hashes such as CRC's or hashes used for hash tables (a software methodology for storing e.g. sets of elements).

In principle you could find that a hash $h$ generated by hash function $H$ is still cryptographically secure if $H'$ derives $0 \| h$ but generally the output of cryptographic hashes have a random distribution. If that wasn't the case then the collision resistance would be lower than approximately half of the output size.

In other words, it would violate the "desirable property" that:

Non-correlation (correlation freeness): hash function inputs and outputs should not be statistically correlated; that is, even a small change in the input should drastically affect the output bits; this phenomenon is called the avalanche effect.

Quoted from the paper "Cryptographic Hash Functions: Recent Design Trends and Security Notions" by Saif Al-Kuwari, James H. Davenport, Russell J. Bradford.

The way that modern hashes are created you can assume that this property holds; it certainly does for SHA-1, SHA-2 and SHA-3 and most other hashes based on bit operations / symmetric cipher techniques.

am flag
Yes, I agree with what you write about the intent of hash functions but can it be shown how the restriction on the output restricts the input? Is the only restriction that a sub selection of outputs proportionally restricts the inputs?
Maarten Bodewes avatar
in flag
I'm not entirely sure what you mean with this. Yes, only specific inputs will map to specific outputs. Generally the input of the hash functions may be limited to a subset by the specific proof of work scheme (it may just be a counter). In general, you'd expect that the same percentage of input messages will produce a specific set of output messages (in the long run). The messages space of most cryptographic hashes is near infinite, so you'd even expect a near infinite number of messages to map even to a single hash - but it might be hard to prove that.
mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.