All articles

Algorithms for cryptocurrency mining

Algorithms for cryptocurrency mining

Each cryptocurrency works by its own specific encryption algorithm. Mining equipment directly decrypts a particular algorithm, which generates transaction processing and blocking. Thus, as a result, we get coins of some kind of crypto currency as a reward.

There are such popular algorithms among others so they are used for several blockers at once.

As you can see, there are a lot of common algorithms, but we can distinguish the most reliable and popular ones among them:

– X11 – used when calculating to receive Dash coins. It worked mainly only with video cards, but recently ASIC-miners for Dash began to produce this algorithm;

– X11Gost – algorithm providing the work of the crypto-socket Sibcoin, also known as “Siberian Chervonets”. This cryptocurrency is a branch from the Dash currency – its domestic counterpart. The algorithm is based on a hash function that meets the requirements of GOST R 34.11-2012;

– SHA256 – algorithm, which operates the most common at the moment, Bitcoin cryptocurrency. In connection with the prevalence of the algorithm, the video cards no longer provide enough power for at least some normal earnings, as they were promptly pushed out by the Chinese ASIC-miners. The algorithm of SHA256 is based on most other algorithms, to some extent copying Bitcoin. Among them, and a fresh Bitcoin Cash;

– Decred – used in the same crypto currency. It is a modification of Blake256. Normally, it is on video cards. Often Mining Decred is carried out in parallel with the mining of DaggerHashimoto with the help of special programs;

– Ethash (DaggerHashimoto), which produces the well-known Ethereum. For Ethereum mining it is recommended to use video cards with a high memory capacity. AMD cards are better adapted to the algorithm, but also video cards from Nvidia 10 series cope quite well;

– Scrypt provides the work of “digital silver” – Litecoin. The algorithm became very popular when ASIC-miners began to appear for Bitcoin mining. Now, ASIC-miners have appeared for the Scrypt algorithm, and the corresponding script is also unavailable for most of the miners;

– Equihash gives life to the currency of Zcash. This crypto currency is now very common among the miners on graphics cards like in Ethereum, the network complexity has greatly increased;

– CryptoNight provides Monero work. It differs from most other popular algorithms in that it is well computed on processors. Of course, on some processors the farm can not be built, but they are quite capable of bringing a pleasant bonus to earnings.

Extended table of encryption algorithms crypto currency


NameTickerAlgorithmYearDistinctive features
BitcoinBTCSHA-2562009The first, the historical algorithm, providing the work of cryptocurrency, recognized by thousands of legal entities, and among them – the European Union.
LitecoinLTCScrypt2011Roughly speaking, Litecoin is a Bitcoin clone, but with accelerated transactions.
NamecoinNMCSHA-2562011First of all, Namecoin is used for the .bit censorship-resistant domain, whose functioning is similar to the functioning of .com and .net domains. It is allocated .bit in that it is not regulated by the main governing body for domain names – ICANN.
BytecoinBCNCryptoNight2012The most secure of algorithms. In principle, it is impossible to hack it. Only an attempt to hack will cost incredible energy costs, and the required capacity of the equipment will have to be equivalent to the power of the average supercomputer. Therefore, in addition to you, no one will get access to your wallet. So say the developers of the algorithm.
PeercoinPPCSHA-2562012Coins of this crypto currency can be obtained not only directly by video card mining, but also by the generation of new coins already available.
DogecoinDOGEScrypt2013It is a clone of Litecoin (a clone of Bitcoin). Of course, not without minor changes. With the popularity of this cryptocurrency, everything is super-typical – it spread due to huge investments in advertising and a memorable symbol.
GridcoinGRCBOINC2013Combined with this system, computing power helps solve problems in many sciences, including climatology, astrophysics, medicine, mathematics, and biology.
RippleXRPECDSA2013The currency was created to speed up banking transactions.
BelaCoinBELAScrypt2014Cryptocurrency photo stock.
DashDASHX112014Almost complete lack of tracking. It is possible to conduct transactions directly.
DashcoinDSHCryptoNight2014Advanced crypto currency, the network code of which is updated rapidly and at low resource costs, and protocol errors are close to 0%.
DigiByteDGBSHA2562014Improved version of Litecoin and Bitcoin
DNotesNOTEScrypt2014Decentralized peer-to-peer crypto currency. Transmitted via the Internet. Transactions are instantaneous. At high transfer speeds, security is maintained, and the commission is minimal.
EinsteiniumEMC2Scrypt2014Kickstarter’s analog for scientific projects.
FoldingCoinFLDCStanford Folding2014It uses consumable power to model the processes of protein folding inside the human body. The results obtained from such studies are used for the invention of new medications that help cure the protein-related diseases associated with the problem of protein folding. Among such diseases there are deadly and dangerous ones. In addition, these studies provide not only the invention of new drugs, but also discoveries, both in the study of protein, and in medicine in general.
MoneroXMRCryptoNight2014High anonymity of remittances.
NautiluscoinNAUTNXT2014Cryptocurrency, created to prove the possibility of the existence of a cryptocurrency as a class of investment assets.
NavcoinNAVX132014Provides NAVTech technology, which in parallel with Tor guarantees the anonymity of private purchases on the Internet.
PinkCoinPINKX112014The currency is based on Ethereum. Provided with a fixed nominal mass of colored diamonds.
PotcoinPOTScrypt2014Represents the legal component of the marijuana industry.
SyscoinSYSScrypt2014The platform, built in the crypto currency, focused on decentralized trade.
VcashXVCBlake2562014Carefully worked out, innovative algorithm. Transactions are fast, secure and work flawlessly.
VertCoinVTCLyra2RE2014It has established itself as a branch protected from ASIC-miners. Accordingly, it is ideologically opposed to the monopolization of mining.
AugurREPSmart contract2015Founded for forecasting for financial markets.
EthereumETHDagger-Hashimoto2015Based on the idea of universality for most projects.
EthereumClassicETCDagger-Hashimoto2015Offshoot from the Etherium with a reduced coin value.
ExpanseEXPDagger-Hashimoto2015Full-scale use of the blockage for the purpose of convenient decentralization of projects.
NEMXEMblockchain2015The project offers notary certification services and provides the ability to instantly transfer money around the world with a low commission. High level of protection of wallets.
RadiumRADSSmartchain2015Maximizing the optimality of using blockchain to ensure the decentralized operation of services.
SiacoinSCBlake2b2015Secure storage of data.
lbryCoinLBCLBRY2016Creativity bank by type of photo stock.
SteemitSTEEMSHA-2562016Multimedia content aggregator.