Proof of work - 51% attack Planned maintenance scheduled April 23, 2019 at 00:00UTC (8:00pm US/Eastern) Announcing the arrival of Valued Associate #679: Cesar Manara Unicorn Meta Zoo #1: Why another podcast?Proof of work for standard computersSimple proof of work example?Is there an “additive” proof-of-work?Stateless proof-of-work system with 0-roundtrip timeCan “Approximate Hashing” work in a Proof-of-Work context?Does encrypting with MGF1/SHA-512/1024-bit seed equal to a 1024-bit key block cipher?Prove that you have $K$ bytes of memoryIs there a proof-of-work scheme vulnerable to length extension attack?Are there Guaranteed Proof-of-work Systems?What Proof of Work does IOTA use?

What is the difference between globalisation and imperialism?

Converted a Scalar function to a TVF function for parallel execution-Still running in Serial mode

Putting class ranking in CV, but against dept guidelines

How to compare two different files line by line in unix?

How do living politicians protect their readily obtainable signatures from misuse?

How many serial ports are on the Pi 3?

How do I find out the mythology and history of my Fortress?

How to draw/optimize this graph with tikz

Project Euler #1 in C++

Is CEO the "profession" with the most psychopaths?

Sum letters are not two different

Generate an RGB colour grid

What do you call the main part of a joke?

AppleTVs create a chatty alternate WiFi network

Find 108 by using 3,4,6

An adverb for when you're not exaggerating

Why is it faster to reheat something than it is to cook it?

Do wooden building fires get hotter than 600°C?

One-one communication

What happened to Thoros of Myr's flaming sword?

Most bit efficient text communication method?

Can a new player join a group only when a new campaign starts?

Is there any word for a place full of confusion?

Can you explain what "processes and tools" means in the first Agile principle?



Proof of work - 51% attack



Planned maintenance scheduled April 23, 2019 at 00:00UTC (8:00pm US/Eastern)
Announcing the arrival of Valued Associate #679: Cesar Manara
Unicorn Meta Zoo #1: Why another podcast?Proof of work for standard computersSimple proof of work example?Is there an “additive” proof-of-work?Stateless proof-of-work system with 0-roundtrip timeCan “Approximate Hashing” work in a Proof-of-Work context?Does encrypting with MGF1/SHA-512/1024-bit seed equal to a 1024-bit key block cipher?Prove that you have $K$ bytes of memoryIs there a proof-of-work scheme vulnerable to length extension attack?Are there Guaranteed Proof-of-work Systems?What Proof of Work does IOTA use?










1












$begingroup$


In the 51% attack on the Proof Of Work Consensus Mechanism, it's often said that you need more hashing power than the rest of the network combined. Though I can't understand why you need that much.



If we break the blockchain network down in Alice, Bob, Charlie and Eve, and they all currently are honest. They all have 1/4 of the total hashing power. From what I understand, they all compete against eachother to calculate the right hash of a block, and the one winning the race gets its block on the blockchain. This happens one time each 10 minutes. Since they're all competing, the hash-power used to create a block in 10 minutes, is 1/4 of the total hashing power.



Now eve decides to go rouge, and builds her own blockchain. The difference is now, that she don't compete with anyone. That means that she can generate a block each 10 minutes (ish) on her private blockchain, keeping up to speed with the rest of the network. Having just a bit more power, she can then build blocks faster than Alice, Bob and Charlie combined, since they are "competing". At some point Eve's blockchain grow larger than the others, and she broadcasts it, and Alice, Bob and Charlie will per the rules switch to Eve's blockchain.



In this scenario the network was compromised by only using 25%(+1) of the hashing power. So why would Eve need 51%? Doesn't she just need to be faster than the fastest honest miner?



Hope you can tell me why I'm wrong.










share|improve this question











$endgroup$
















    1












    $begingroup$


    In the 51% attack on the Proof Of Work Consensus Mechanism, it's often said that you need more hashing power than the rest of the network combined. Though I can't understand why you need that much.



    If we break the blockchain network down in Alice, Bob, Charlie and Eve, and they all currently are honest. They all have 1/4 of the total hashing power. From what I understand, they all compete against eachother to calculate the right hash of a block, and the one winning the race gets its block on the blockchain. This happens one time each 10 minutes. Since they're all competing, the hash-power used to create a block in 10 minutes, is 1/4 of the total hashing power.



    Now eve decides to go rouge, and builds her own blockchain. The difference is now, that she don't compete with anyone. That means that she can generate a block each 10 minutes (ish) on her private blockchain, keeping up to speed with the rest of the network. Having just a bit more power, she can then build blocks faster than Alice, Bob and Charlie combined, since they are "competing". At some point Eve's blockchain grow larger than the others, and she broadcasts it, and Alice, Bob and Charlie will per the rules switch to Eve's blockchain.



    In this scenario the network was compromised by only using 25%(+1) of the hashing power. So why would Eve need 51%? Doesn't she just need to be faster than the fastest honest miner?



    Hope you can tell me why I'm wrong.










    share|improve this question











    $endgroup$














      1












      1








      1





      $begingroup$


      In the 51% attack on the Proof Of Work Consensus Mechanism, it's often said that you need more hashing power than the rest of the network combined. Though I can't understand why you need that much.



      If we break the blockchain network down in Alice, Bob, Charlie and Eve, and they all currently are honest. They all have 1/4 of the total hashing power. From what I understand, they all compete against eachother to calculate the right hash of a block, and the one winning the race gets its block on the blockchain. This happens one time each 10 minutes. Since they're all competing, the hash-power used to create a block in 10 minutes, is 1/4 of the total hashing power.



      Now eve decides to go rouge, and builds her own blockchain. The difference is now, that she don't compete with anyone. That means that she can generate a block each 10 minutes (ish) on her private blockchain, keeping up to speed with the rest of the network. Having just a bit more power, she can then build blocks faster than Alice, Bob and Charlie combined, since they are "competing". At some point Eve's blockchain grow larger than the others, and she broadcasts it, and Alice, Bob and Charlie will per the rules switch to Eve's blockchain.



      In this scenario the network was compromised by only using 25%(+1) of the hashing power. So why would Eve need 51%? Doesn't she just need to be faster than the fastest honest miner?



      Hope you can tell me why I'm wrong.










      share|improve this question











      $endgroup$




      In the 51% attack on the Proof Of Work Consensus Mechanism, it's often said that you need more hashing power than the rest of the network combined. Though I can't understand why you need that much.



      If we break the blockchain network down in Alice, Bob, Charlie and Eve, and they all currently are honest. They all have 1/4 of the total hashing power. From what I understand, they all compete against eachother to calculate the right hash of a block, and the one winning the race gets its block on the blockchain. This happens one time each 10 minutes. Since they're all competing, the hash-power used to create a block in 10 minutes, is 1/4 of the total hashing power.



      Now eve decides to go rouge, and builds her own blockchain. The difference is now, that she don't compete with anyone. That means that she can generate a block each 10 minutes (ish) on her private blockchain, keeping up to speed with the rest of the network. Having just a bit more power, she can then build blocks faster than Alice, Bob and Charlie combined, since they are "competing". At some point Eve's blockchain grow larger than the others, and she broadcasts it, and Alice, Bob and Charlie will per the rules switch to Eve's blockchain.



      In this scenario the network was compromised by only using 25%(+1) of the hashing power. So why would Eve need 51%? Doesn't she just need to be faster than the fastest honest miner?



      Hope you can tell me why I'm wrong.







      block-cipher proof-of-work






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited 17 mins ago









      Ella Rose

      17.1k44586




      17.1k44586










      asked 4 hours ago









      Benjamin LarsenBenjamin Larsen

      182




      182




















          1 Answer
          1






          active

          oldest

          votes


















          2












          $begingroup$


          Since they're all competing, the hash-power used to create a block in 10 minutes, is 1/4 of the total hashing power.




          That's not correct.



          If the work effort is set to $n$, that is, it takes an expected $2^n$ hashes before someone finds a valid preimage. If Alice, Bob, Charlie and Eve are all working equally hard, then we would expect that each one would end up computing an average of $2^n / 4$ hashes before someone finds a preimage. It might be Alice, who has computed only $2^n / 4$ hashes, but still a total of $2^n$ hashes were computed.



          So, if Eve goes off on her own, she'll need to compute her own $2^n$ hashes herself before she finds a preimage; in that time, Alice, Bob and Charlie will end up computing $3 cdot 2^n$ hashes, enough to find an expected 3 links in the hash chain, before Eve can compute one - Eve cannot win this race in the long term.



          (Note: this analysis rather assumes that when Alice finds the preimage, she instantly announces it, and the others immediately start searching based for the next preimage. This isn't precisely true; however that isn't nearly a large enough effect to give Eve an advantage when she has only 1/4 of the computing power)






          share|improve this answer









          $endgroup$












          • $begingroup$
            That is a really good explanation, thank you :)
            $endgroup$
            – Benjamin Larsen
            2 hours ago











          Your Answer








          StackExchange.ready(function()
          var channelOptions =
          tags: "".split(" "),
          id: "281"
          ;
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function()
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled)
          StackExchange.using("snippets", function()
          createEditor();
          );

          else
          createEditor();

          );

          function createEditor()
          StackExchange.prepareEditor(
          heartbeatType: 'answer',
          autoActivateHeartbeat: false,
          convertImagesToLinks: false,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: null,
          bindNavPrevention: true,
          postfix: "",
          imageUploader:
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          ,
          noCode: true, onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          );



          );













          draft saved

          draft discarded


















          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f68895%2fproof-of-work-51-attack%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown

























          1 Answer
          1






          active

          oldest

          votes








          1 Answer
          1






          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes









          2












          $begingroup$


          Since they're all competing, the hash-power used to create a block in 10 minutes, is 1/4 of the total hashing power.




          That's not correct.



          If the work effort is set to $n$, that is, it takes an expected $2^n$ hashes before someone finds a valid preimage. If Alice, Bob, Charlie and Eve are all working equally hard, then we would expect that each one would end up computing an average of $2^n / 4$ hashes before someone finds a preimage. It might be Alice, who has computed only $2^n / 4$ hashes, but still a total of $2^n$ hashes were computed.



          So, if Eve goes off on her own, she'll need to compute her own $2^n$ hashes herself before she finds a preimage; in that time, Alice, Bob and Charlie will end up computing $3 cdot 2^n$ hashes, enough to find an expected 3 links in the hash chain, before Eve can compute one - Eve cannot win this race in the long term.



          (Note: this analysis rather assumes that when Alice finds the preimage, she instantly announces it, and the others immediately start searching based for the next preimage. This isn't precisely true; however that isn't nearly a large enough effect to give Eve an advantage when she has only 1/4 of the computing power)






          share|improve this answer









          $endgroup$












          • $begingroup$
            That is a really good explanation, thank you :)
            $endgroup$
            – Benjamin Larsen
            2 hours ago















          2












          $begingroup$


          Since they're all competing, the hash-power used to create a block in 10 minutes, is 1/4 of the total hashing power.




          That's not correct.



          If the work effort is set to $n$, that is, it takes an expected $2^n$ hashes before someone finds a valid preimage. If Alice, Bob, Charlie and Eve are all working equally hard, then we would expect that each one would end up computing an average of $2^n / 4$ hashes before someone finds a preimage. It might be Alice, who has computed only $2^n / 4$ hashes, but still a total of $2^n$ hashes were computed.



          So, if Eve goes off on her own, she'll need to compute her own $2^n$ hashes herself before she finds a preimage; in that time, Alice, Bob and Charlie will end up computing $3 cdot 2^n$ hashes, enough to find an expected 3 links in the hash chain, before Eve can compute one - Eve cannot win this race in the long term.



          (Note: this analysis rather assumes that when Alice finds the preimage, she instantly announces it, and the others immediately start searching based for the next preimage. This isn't precisely true; however that isn't nearly a large enough effect to give Eve an advantage when she has only 1/4 of the computing power)






          share|improve this answer









          $endgroup$












          • $begingroup$
            That is a really good explanation, thank you :)
            $endgroup$
            – Benjamin Larsen
            2 hours ago













          2












          2








          2





          $begingroup$


          Since they're all competing, the hash-power used to create a block in 10 minutes, is 1/4 of the total hashing power.




          That's not correct.



          If the work effort is set to $n$, that is, it takes an expected $2^n$ hashes before someone finds a valid preimage. If Alice, Bob, Charlie and Eve are all working equally hard, then we would expect that each one would end up computing an average of $2^n / 4$ hashes before someone finds a preimage. It might be Alice, who has computed only $2^n / 4$ hashes, but still a total of $2^n$ hashes were computed.



          So, if Eve goes off on her own, she'll need to compute her own $2^n$ hashes herself before she finds a preimage; in that time, Alice, Bob and Charlie will end up computing $3 cdot 2^n$ hashes, enough to find an expected 3 links in the hash chain, before Eve can compute one - Eve cannot win this race in the long term.



          (Note: this analysis rather assumes that when Alice finds the preimage, she instantly announces it, and the others immediately start searching based for the next preimage. This isn't precisely true; however that isn't nearly a large enough effect to give Eve an advantage when she has only 1/4 of the computing power)






          share|improve this answer









          $endgroup$




          Since they're all competing, the hash-power used to create a block in 10 minutes, is 1/4 of the total hashing power.




          That's not correct.



          If the work effort is set to $n$, that is, it takes an expected $2^n$ hashes before someone finds a valid preimage. If Alice, Bob, Charlie and Eve are all working equally hard, then we would expect that each one would end up computing an average of $2^n / 4$ hashes before someone finds a preimage. It might be Alice, who has computed only $2^n / 4$ hashes, but still a total of $2^n$ hashes were computed.



          So, if Eve goes off on her own, she'll need to compute her own $2^n$ hashes herself before she finds a preimage; in that time, Alice, Bob and Charlie will end up computing $3 cdot 2^n$ hashes, enough to find an expected 3 links in the hash chain, before Eve can compute one - Eve cannot win this race in the long term.



          (Note: this analysis rather assumes that when Alice finds the preimage, she instantly announces it, and the others immediately start searching based for the next preimage. This isn't precisely true; however that isn't nearly a large enough effect to give Eve an advantage when she has only 1/4 of the computing power)







          share|improve this answer












          share|improve this answer



          share|improve this answer










          answered 3 hours ago









          ponchoponcho

          94.5k2151248




          94.5k2151248











          • $begingroup$
            That is a really good explanation, thank you :)
            $endgroup$
            – Benjamin Larsen
            2 hours ago
















          • $begingroup$
            That is a really good explanation, thank you :)
            $endgroup$
            – Benjamin Larsen
            2 hours ago















          $begingroup$
          That is a really good explanation, thank you :)
          $endgroup$
          – Benjamin Larsen
          2 hours ago




          $begingroup$
          That is a really good explanation, thank you :)
          $endgroup$
          – Benjamin Larsen
          2 hours ago

















          draft saved

          draft discarded
















































          Thanks for contributing an answer to Cryptography Stack Exchange!


          • Please be sure to answer the question. Provide details and share your research!

          But avoid


          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.

          Use MathJax to format equations. MathJax reference.


          To learn more, see our tips on writing great answers.




          draft saved


          draft discarded














          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f68895%2fproof-of-work-51-attack%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown





















































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown

































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown







          Popular posts from this blog

          Category:Fedor von Bock Media in category "Fedor von Bock"Navigation menuUpload mediaISNI: 0000 0000 5511 3417VIAF ID: 24712551GND ID: 119294796Library of Congress authority ID: n96068363BnF ID: 12534305fSUDOC authorities ID: 034604189Open Library ID: OL338253ANKCR AUT ID: jn19990000869National Library of Israel ID: 000514068National Thesaurus for Author Names ID: 341574317ReasonatorScholiaStatistics

          Reverse int within the 32-bit signed integer range: [−2^31, 2^31 − 1]Combining two 32-bit integers into one 64-bit integerDetermine if an int is within rangeLossy packing 32 bit integer to 16 bitComputing the square root of a 64-bit integerKeeping integer addition within boundsSafe multiplication of two 64-bit signed integersLeetcode 10: Regular Expression MatchingSigned integer-to-ascii x86_64 assembler macroReverse the digits of an Integer“Add two numbers given in reverse order from a linked list”

          Kiel Indholdsfortegnelse Historie | Transport og færgeforbindelser | Sejlsport og anden sport | Kultur | Kendte personer fra Kiel | Noter | Litteratur | Eksterne henvisninger | Navigationsmenuwww.kiel.de54°19′31″N 10°8′26″Ø / 54.32528°N 10.14056°Ø / 54.32528; 10.14056Oberbürgermeister Dr. Ulf Kämpferwww.statistik-nord.deDen danske Stats StatistikKiels hjemmesiderrrWorldCat312794080n790547494030481-4