DigiByte Mining Breakdown
DigiByte uses five individual mining algorithms that are equally weighted. Each algorithm has its own difficulty adjustment that is weighted against the other algorithms in a dynamic process known as MultiShield.
MultiShield is the advanced version of the original DigiShield (asymmetric difficulty adjustment now widely implemented in many other blockchains). DigiByte pioneered both MultiShield and DigiShield.
These are the five individual mining algorithms that are equally weighted (5x 20% each, makes 100% in total):
- SHA256 (20%), The SHA (Secure Hash Algorithm) is one of a number of cryptographic hash functions. A cryptographic hash is like a signature for a text or a data file. SHA-256 algorithm generates an almost-unique, fixed size 256-bit (32-byte) hash. Hash is a one way function – it cannot be decrypted back. This makes it suitable for password validation, challenge hash authentication, anti-tamper, digital signatures. SHA-256 is one of the successor hash functions to SHA-1, and is one of the strongest hash functions available.
- Scrypt (20%), In cryptography, scrypt (pronounced "ess crypt") is a password-based key derivation function created by Colin Percival, originally for the Tarsnap online backup service. The algorithm was specifically designed to make it costly to perform large-scale custom hardware attacks by requiring large amounts of memory. In 2016, the scrypt algorithm was published by IETF as RFC 7914. A simplified version of scrypt is used as a proof-of-workscheme by a number of cryptocurrencies, first implemented by an anonymous programmer called ArtForz in Tenebrix and followed by Fairbrix and Litecoin soon after.
- Odocrypt (20%), “Regarding ASIC-resistance: Odo is a substitution-permutation network. Both the substitutions (s-boxes) and permutations (p-boxes) change every 10 days. If they didn't change, it would be easy to create an ASIC that significantly outperformed any other hardware, but because they change, the ASIC would need to be able to reconfigure itself. There's already hardware that specializes in being able to reconfigure itself - the FPGA. Additionally, FPGAs are really good at implementing small s-boxes, so while an ASIC could, in theory, be built, the advantage over FPGAs would be much smaller than for typical proof-of-work algorithms.“
- Skein (20%), Skein is a cryptographic hash function and one of five finalists in the NIST hash function competition. Entered as a candidate to become the SHA-3 standard, the successor of SHA-1 and SHA-2, it ultimately lost to NIST hash candidate Keccak. The name Skein refers to how the Skein function intertwines the input, similar to a skein of yarn.
- Qubit (20%), Qubit which is a fast and super secure hashing algorithm. This algorithm is only suitable for ASIC mining.