-
Notifications
You must be signed in to change notification settings - Fork 84
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
The FNV hash functions are used incorrectly #49
Comments
Good finding. |
Yes, I clarified the description. I'm not a cryptography expert to assess if that's worth fixing. Maybe that would save us from the mysterious DAG compression attack. |
I see in ethash the mis-implementation has been deliberately chosen DAG access in PP is quite different from the one in ethash.
Not a cryptographer either but quite different paths. |
In the original design, each byte of input is treated with a round of the FNV hashing.
https://en.wikipedia.org/wiki/Fowler%E2%80%93Noll%E2%80%93Vo_hash_function
In Ethash input data is hashed in 32-bit chunks following the FNV-1 formula for single round.
This is not changed in ProgPoW except for using FNV-1a formula.
This is "more correct" implementation: https://godbolt.org/z/tO3Lqt.
The text was updated successfully, but these errors were encountered: