Skip to content

RandomWASM #4

@samholmes

Description

@samholmes

What changes to RandomX hash algorithm would be necessary to remove the advantage of running the hash algorithm in native implementation over WASM?

A modified RandomX hash algorithm could be called RandomWASM. It would be designed to be an WebAssembly-first implementation of an ASIC-resistant algorithm. RandomWASM would be able to achieve comparable performances in WASM as a native binary for the same hardware. This design would allow for web applications to implement ASIC-resistant hash algorithms with security peace of mind. Is this pursuit feasible?

I'd imagine removing the inefficient instruction sets from the RandomX when executed in WASM. Secondly, removing the memory requirements of that RandomX has in full-mode. RandonWASM would operate with memory requirements that fit the constraint of a web environment.

The purpose of this algorithm is a web-compatible ASIC-resistant algorithm. It may not be viable to mine Monero or other cryptocurrencies which deploy RandomX as their hash algorithm, but it would open up the potential for other cryptocurrencies and crypto-projects which would deploy RandomWASM.

What are the list of instruction sets to remove/replace from RandomX which would make RandomWASM?

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions