Different Types Of C ryptocurrency Algorithms

First, we need to understand what is “Hash”?

Hash is a “message digest” – a number generated from a string of text, the hash itself is smaller than the text, it is almost not possible to generate another string of text with the same hash value. Learn more about hashes

Second, we need to understand what is it “Mining Hashing Algorithm”

A hashing algorithm is a cryptographic hash function, the mathematical algorithm that maps data of arbitrary size to a hash of a fixed size. Hashing algorithm being used for digital signatures and authentication.







The Most Common C ryptocurrency Mining Algorithms

SHA-256 Algorithm:

SHA stands for “Secure hash Algorithm” (SHA-256) generates a unique 256-bit (32-byte) signature for a text string. Block processing time for SHA-256 generally ranges from six to ten minutes and requires hash rates at the Giga hashes per second (GH/s). SHA-256 hash rate is measured by GH/s: Gigahashes per second, or one billion hash computations per second. SHA-256 algorithm mining can be performed on an ASIC hardware (application-specific integrated circuit)

The SHA -256 cryptocurrency algorithm is used to mine:

BitcoinCash (BCH)

Bitcoin (BTC)

21Coin (21)

Peercoin (PPC)

Namecoin (NMC)

Unobtanium (UNO)

Betacoin (BET)

Bytecoin (BTE)

Joulecoin (XJO)

Devcoin (DVC)

Ixcoin (IXC)

Terracoin (TRC)

Battlecoin (BCX)

Takeicoin (TAK)

PetroDollar (P$)

Benjamins (BEN)

Globe (GLB)

Unicoin (UNIC)

Snowcoin (SNC)

Zetacoin (ZET)

Titcoin (TIT)

Scrypt Algorithm:

Scrypt algorithm requires large amounts of memory and there was a need to design it to perform large-scale custom hardware attacks. The Scrypt algorithm is more simple and quicker than the SHA-256 algorithm.

Scrypt’s hash rate is measured by KH/s: Kilohashes per second, or one thousand hash computations per second.

Scrypt algorithm mining can be performed on a computer CPU, Graphics Processing Unit (GPU), there is some ASICs hardware that is available for Scrypt mining.

The Scrypt cryptocurrency algorithm is used to mine:

Litecoin (LTC)

Dogecoin (DOGE)

Novacoin (NVC)

WorldCoin (WDC)

Latium (LAT)

FeatherCoin (FRC)

Bitmark (BTM)

TagCoin (TAG)

Ekrona (KRN)

MidasCoin (MID)

DigitalCoin (DGC)

Elacoin (ELC)

Anoncoin (ANC)

PandaCoins (PND)

GoldCoin (GLD)

X11 Algorithm:

The X11 hashing algorithm created by Dash core developer Evan Duffield. The X11 uses a sequence of eleven scientific hashing algorithms for the proof-of-work. One of the biggest benefits of using X11 algorithm is energy efficiency, GPUs require approximately 30% less wattage and run 30-50% cooler than they do with Scrypt.

X11’s hash rate is measured by MH/s: mega hashes per second, or one million hash computations per second.

The X11 cryptocurrency algorithm is used to mine:

Dash (DASH)

CannabisCoin (CANN)

StartCoin (START)

MonetaryUnit (MUE)

Karmacoin (Karma)

XCurrency (XC)







Cryptonight Algorithm:

The Cryptonight algorithm was designed to be suitable for PC CPUs, it was implemented in an open-sourced protocol that allows increasing privacy in cryptocurrency transactions – “CryptoNote”.

Unlike the Scrypt algorithm, the Cryptonight algorithm depends on all the previous blocks for each new block.

Cryptonight’s hash rate is measured by H/s: Hashes per second, hash computations per second.

The Cryptonight cryptocurrency algorithm is used to mine:

Monero (XMR)

Bytecoin (BCN)

Boolberry (BBR)

Dashcoin (DSH)

DigitalNote (XDN)

DarkNetCoin (DNC)

FantomCoin (FCN)

Pebblecoin (XPB)

Quazarcoin (QCN)

Dagger Hashimoto – Ethash Algorithm:

Dagger Hashimoto is a proposed spec for the mining algorithm for Ethereum and builds on two key pieces of previous work:

1. Dagger: algorithm by Vitalik Buterin, Dagger was meant to be an alternative to existing memory-hard algorithms like Scrypt, which are memory-hard but are also very hard to verify when their memory-hardness is increased to genuinely secure levels. However, Dagger was proven to be vulnerable to shared memory hardware acceleration by Sergio Lerner and was then dropped in favor of other avenues of research.

2. Hashimoto: algorithm by Thaddeus Dryja which intends to achieve ASIC resistance by being IO-bound, ie. making memory reads the limiting factor in the mining process. Hashimoto uses the blockchain as a source of data, simultaneously satisfying.

(source: “Etherum / WIKI“)

Dagger Hashimoto’s hash rate is measured by MH/s: mega hashes per second, or one million hash computations per second.

The Dagger Hashimoto – Ethash algorithm is used to mine:



Ethereum (ETH)

Ethereum Classic (ETC)

Expanse (EXP)