Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - AnonyMint

Pages: 1 [2]
16
General Discussion / Re: $5000 Bounty - Momentum Proof-of-Work Hacking
« on: November 08, 2013, 04:20:13 pm »
The point of Scrypt was to make parallel operation difficult and its primary weakness is that validation time suffers as you scale it.

If you don't require that the first match in the sequence of generated pseudo-random numbers, then my upthread described parallelism attack works to allow GPUs to blow away CPUs, assuming the pseudo-random sequence can be generated much faster than the random memory latency bound on the CPU so the GPU can try 100s of values from the same pseudo-random sequence in parallel to hide the memory latency.

If you do require it, then you lose the fast validation time.

Do you get it now or you going to continue to ignore me?

I expended the time to explain this in more detail:

https://bitcointalk.org/index.php?topic=325261.msg3520992#msg3520992

I think that is the last effort I will apply to this.

17
General Discussion / Re: $5000 Bounty - Momentum Proof-of-Work Hacking
« on: November 07, 2013, 09:26:00 pm »
You have NOT CONVINCED ME...

Perfect. Confirmed my suspicions about what I've heard.

I have hashed (pun intended) this out with many other intelligent people who also disagree with your assessments.

And so why don't you list the technical reasons why you and they disagree.

18
General Discussion / Re: $5000 Bounty - Momentum Proof-of-Work Hacking
« on: November 07, 2013, 08:50:36 pm »
Ok, lets do this on a GPU..... I have found through experience that theoretical gains on the GPU often do not pan out as you expect.   So I need to see an implementation.

Your bounty only called for showing it is NO BETTER than Scrypt. I already did. I don't have to prove it is much faster on the GPU (but it will also be, yet that is irrelevant to how you stated your bounty).

If you choose to blissfully ignore what has been revealed to you, then so be it. I love it if you go down the wrong road. Please do. Worth much more to me than the $5000.

19
General Discussion / Re: $5000 Bounty - Momentum Proof-of-Work Hacking
« on: November 07, 2013, 08:45:27 pm »
[redacted my explanation of why $100 per hour is an insult to me]

You wanted help on insights into weaknesses. I have explained it. If there is something you don't understand, ask.

Your attitude sucks. If you want to discuss why you doubt my claim, then fine we can engage. But if you expect everyone to be your servant, then I will stop helping you.

20
General Discussion / Re: $5000 Bounty - Momentum Proof-of-Work Hacking
« on: November 07, 2013, 08:12:39 pm »
Your original bounty didn't ask for an implementation. And $5000 doesn't buy enough time from me.

It is up to you how far you want to go down the wrong road.

There is no way to make CPU-only and fast verification. I realized that recently in analysis and research. I realize this is big problem for your coin design.

21
General Discussion / Re: $5000 Bounty - Momentum Proof-of-Work Hacking
« on: November 07, 2013, 08:05:07 pm »
From bitcointalk.org thread,  link=topic=313479.msg3363346#msg3363346 date=1382116292

Quote from: bytemaster
If you are able to convince me this proof-of-work is no better than Scrypt then you will win the 30 btc bounty.

Given my immediately prior post, I hereby claim the 30 BTC bounty.

22
General Discussion / Re: $5000 Bounty - Momentum Proof-of-Work Hacking
« on: November 07, 2013, 07:58:57 pm »
The point of Scrypt was to make parallel operation difficult and its primary weakness is that validation time suffers as you scale it.

If you don't require that the first match in the sequence of generated pseudo-random numbers, then my upthread described parallelism attack works to allow GPUs to blow away CPUs, assuming the pseudo-random sequence can be generated much faster than the random memory latency bound on the CPU so the GPU can try 100s of values from the same pseudo-random sequence in parallel to hide the memory latency.

If you do require it, then you lose the fast validation time.

Do you get it now or you going to continue to ignore me?

23
General Discussion / Re: $5000 Bounty - Momentum Proof-of-Work Hacking
« on: November 07, 2013, 06:14:58 am »
Anyway, the proof is in the implementation.   

I think we are sufficiently expert with 3 decades of programming experience, that we can make correct analysis without implementing.

I am still waiting for your replies. Hope you feel better. Try taking 50,000 IU of Vit D3. That kicks my colds to the curb within 24 hours.

24
General Discussion / Re: $5000 Bounty - Momentum Proof-of-Work Hacking
« on: November 06, 2013, 10:02:13 pm »
While the GPU can hide latency it cannot change bandwidth and your bandwidth usage is still N^2.

Memory bandwidth is several times faster on the GPU than CPU and you won't get close to saturating memory bandwidth on the CPU because the full random memory access latency is too high and you can only run at most 8 threads on a core i7 thus unable to hide the latency entirely. Software threads above that 8 count don't matter.

Your constant time hardware gains in memory bandwidth and parallelism are combating a N^2 algorithmic disadvantage.    It may be possible to develop a GPU based solution, but how much faster it will be is TBD... will it be 10x faster?  I don't think so.

Why do you assume the GPU can't use a hash table also?

25
General Discussion / Re: $5000 Bounty - Momentum Proof-of-Work Hacking
« on: November 06, 2013, 09:59:06 pm »
This would probably be the FASTEST way to implement this proof of work on a GPU but still requires TARGET_MEMORY and thus does not qualify for the bounty.

The CPU requires the target memory also and would thus be significantly slower due to not even saturating its slower memory bandwidth due to being memory latency bound.

26
General Discussion / Re: $5000 Bounty - Momentum Proof-of-Work Hacking
« on: November 06, 2013, 09:55:09 pm »
Ok... a few corrections for you to consider.   The address space of the birthdays is 50 bits.   The TARGET_MEMORY is the number of birthdays that must be stored to have a 90+% probability of finding 1 collision once you have filled TARGET_MEMORY.    As a result, this isn't sparse memory access unless you are operating on some MULTIPLE of the TARGET_MEMORY.

Correct that by using a hash table it is no longer physically sparse, so CPU and GPU only need to have the target physical memory. So thus the birthday aspect is useless except for causing the collisions on the serial hash bucks.

Your GPU algorithm is still O(C * N^2) where C is some constant factor improvement.
CPU algorithm is O( C * N )

While the GPU can hide latency it cannot change bandwidth and your bandwidth usage is still N^2.

Only if you assume the GPU can't use a hash table too. I see no reason for that to be the case, and as I wrote in my prior post. And I expect the collisions to be irrelevant. If that last sentence is the only one that is in contention, I can explain more?

Also re-read my prior post, I added to it.

27
General Discussion / Re: $5000 Bounty - Momentum Proof-of-Work Hacking
« on: November 06, 2013, 09:36:12 pm »
While the GPU can hide latency it cannot change bandwidth and your bandwidth usage is still N^2.

Memory bandwidth is several times faster on the GPU than CPU and you won't get close to saturating memory bandwidth on the CPU because the full random memory access latency is too high and you can only run at most 8 hardware hyperthreads on a core i7 thus unable to hide the latency entirely. Software threads above that 8 count don't matter.

You have leveraged a weakness of the CPU relative to the GPU. To make a CPU-only PoW, you must leverage a strength of the CPU relative to the GPU and ASIC.

On the CPU your algorithm is random main memory latency bound while on the GPU it is main memory bandwidth bound. Thus on the CPU approximately at best 64 bytes cache line size at several hundred clock cycles per random access, and on the GPU up to 260 GB per second if utilizing the full 128 byte cache line size.

Also if the GPU has 6 GB and your target memory is 0.75 GB, then the GPU can run 8 instances and each can reach maximum memory bandwidth.

28
General Discussion / Re: $5000 Bounty - Momentum Proof-of-Work Hacking
« on: November 06, 2013, 05:45:09 pm »
Okay if I understand correctly your proposed PoW algorithm, we are generating pseudo-random values that can range over the address space of the memory size we target until we generate a duplicate (or triplicate). The Birthday math tells us that we will find a solution with 50% probability before visiting less than roughly 10% of the addresses, or 99% before visiting less than roughly 20% of the addresses. Thus this is a way to require large memory without actually writing to every memory address, i.e. a sparse memory access algorithm. Btw, I also considered this sort of algorithm before and dumped it.

Assuming the generation of the pseudo-random values can be accelerated by parallelism, i.e. that the algorithm is main memory latency bound, then the GPU is going to be much faster, because the GPU masks memory latency by employing 1000s of threads, i.e. we can test 1000s of pseudo-random values in parallel. This was the key myopia that caused Litecoin to fail at stopping GPUs from outperforming CPUs, although it did improve the difference relative to Bitcoin's PoW.

I don't see how the use of a hash table really changes the outcome significantly, as it will only serialize perhaps every 10 buckets and we assume the pseudo-random values are uniformly distributed over the entire address space. Collisions with a 1000 threads are going to be rare.

I have revealed my key insight into PoW. If you weren't aware of this and I am correct, I hope you tip me consumerately regardless if it leads you to make changes or not (I should not be responsible for your success, only for proving what doesn't work).

Edited: to insert word "not" after "I should" that was missing.

29
General Discussion / Re: $5000 Bounty - Momentum Proof-of-Work Hacking
« on: November 06, 2013, 05:30:29 pm »
bytemaster, I don't have spare time to implement. How about I share my thoughts and then you decide if I deserve even a small token payment for my contribution? You might gain some insight into how I think a CPU-only PoW could be implemented, but I won't be providing a complete algorithm today.

I don't even have a GPU handy, nor the development environment for them. I would be speaking on a theoretical basis after studying Scrypt and understanding why Litecoin failed (yet still improved the ratio for GPU advantage compared to Bitcoin).

30
General Discussion / Re: $5000 Bounty - Momentum Proof-of-Work Hacking
« on: November 06, 2013, 02:57:58 pm »
For example:  Suppose momentum as specked requires about 1 GB of RAM for maximum performance and produces hashes at 1hz.   If you design an algorithm that only requires 1 MB of RAM and can find hashes at .001 hz then you win because you will have proven that computational complexity is linear with RAM use rather than non-linear like I believe the problem calls for.   

Best of luck to you all!

I believe there is a weakness where GPUs can run much faster, but it doesn't requiring lowering the memory. If I explain it to you and am correct, do I qualify for at least part of the bounty?

It is possible I am incorrect or have misunderstood some aspect of the algorithm, so let's not jump to conclusions yet.

Pages: 1 [2]