A hardware maker optimizes one or more of: cost, performance, efficiency, time to market or reliability.
In this article we walk the interested reader through this process for SHA-256, with emphasis on ASICs, and finally leading to the supply chain. In parentheses you find the rough improvement. C = cost, E = efficiency, P = performance. Note that C+5% means cost was improved (=reduced) by 5%. The article is rather dry without drawings. With sufficient interest we might add more detail or drawings. From FPGA on it’s a firsthand account.
For now it’s good as it is. Enjoy.
Phase I — CPU…
[This article is an edited version of the talk given by Werner Almesberger at ETC Summit 2019 in Vancouver, on Oct 4th, 2019.]
Good afternoon, my name is Werner Almesberger.
I’ve worked on the Linux kernel many years ago, and today I talk about what I am working on at the moment. For a change that has nothing to do with software, it’s a mining ASIC for ETC, for Ethash. Linzhi is a Shenzhen-based fabless semiconductor company, we announced our Ethash miner at the last ETC Summit, expecting a performance of about 1.4 …
The Original Idea
Scrypt predates cryptocurrencies, and first appeared in the cryptocurrency scene as part of Tenebrix in September 2011, implemented by ArtForz. A few weeks later it was picked up by Charlie Lee for Litecoin, and is in use by Litecoin until today.
Tenebrix promised Scrypt to be ‘GPU resistant’, and to ‘resist the creation of efficient GPU, FPGA and even ASIC implementations’. It promised to ‘remain CPU friendly and GPU hostile’, and to become a ‘CPUclusive cryptocurrency’.
Early Tenebrix users reported hashrates of about 1.6 khash/sec on their CPUs.
Today Tenebrix is history, however Litecoin is still around and the Bitmain L3+ Scrypt miner can mine 500 MH/s at 900W, exceeding the 2011 CPUs by a factor of 300,000. …
We know more than what we have talked about so far.
We know but we cannot prove.
There are two types of knowledge: A priori and a posteriori knowledge.
Our knowledge about the attack on Ethereum is a posteriori knowledge, so we don’t need to ask anyone, and we don’t need proof ourselves.
A posteriori are empirical facts unknowable by reason alone.
Since we don’t want to ally with the attackers, and we have no proof that would satisfy an audience that is tired in a world of fake news and FUD, what we decided to do is to try to open up eyes about what might be going on — plausibilities, motivations, personal and corporate backgrounds.
We do this for 9 months now, it binds a significant amount of our resources. …
Today we ordered the first set of wafers for our Ethash ASIC, announced almost a year ago on September 13, 2018 at the ETC Summit 2018 in Seoul. This is called the chip tapeout.
The announced specs were for 1400 MHash at 1000 Watts. Pricing was announced as 4 months ROI, and the timeline was given as 12/18 for tapeout, 04/19 for samples and 06/19 for mass production.
The key points of today’s first wafer order for our new Linzhi E1400 Ethash ASIC are:
EIP 1057 (ProgPoW): Open Chip Design for 1% cost/power increase
Adding a pseudo-random program to the PoW algorithm is a key technical idea described in EIP 1057 (ProgPoW). The theory goes that the compute area of a GPU is underutilized compared to memory bandwidth. ProgPoW is then designed such that it “saturates both compute and memory bandwidth at once”.
Since the GPU is almost fully utilized, there’s little opportunity for specialized ASICs to gain efficiency.
There should be little opportunity for efficiency gains compared to a commodity GPU.
While a custom ASIC is still possible, the efficiency gains available are minimal.
These would result in minimal, roughly 1.1x-1.2x, …
Can you make an ASIC for algorithm X?
How fast can it be?
Can it be better than Y?
Today we want to document the 5 steps that we typically think through, roughly, to answer such questions.
We intentionally leave out considerations for platform, programmability and software stack, industry trends or competition. This article is about the technical feasibility of a chip design for a given algorithm.
If we have an algorithm’s math description, we start from that. If we only have source code, we need to convert it to a math description first.
The reason for going to math first is that hardware may use a fundamentally different way to compute an algorithm.
Example task: Search how many data items X exist within a database P and locate them. Software may need a data structure, maybe a hash table, and many memory accesses. Hardware may be able to produce all results in one clock cycle using a CAM (content-addressable memory). …
ECIP 1043 proposed to set a limit on the maximum size of the DAG, and no longer increase it on epoch schedule.
ECIP 1043 was closed by its author Cody Burns in December 2018, but today we take another look at motivation and specification, from our perspective of being a Shenzhen asicmaker (with upcoming Ethash chip).
Motivation (from the ECIP):
Linzhi Ltd. is a private fabless semiconductor company in Shenzhen.
On January 8th, we called upon Ethereum developers to publish rules and guidelines for what constitutes a good ProgPoW ASIC maker.
Today Alexey Akhunov published a wonderful opinion piece with 4 claims, which we see as a massive effort to bridge the hardware-software divide.
The Qi Hardware community provided a Chinese translation of Alexey’s claims:
To respond, we first quote Chris Ziomkowski, founder of XTend.online (unaffiliated with us).
The reasonable question was: “What should chipmakers do to not be labeled bad actors after designing a crypto (here: PoW) chip?” …
On January 8, 2019, Linzhi Ltd, a private fabless semiconductor company in Shenzhen, called upon Ethereum developers to publish rules and guidelines for what constitutes a good ProgPoW ASIC maker.
Little did we know that an intensive debate between many stakeholders would ensue, and since we now feel that has come to a conclusion, we want to summarize lessons learned, our takeaway. Biased.
Ethereum is a wonderful project, decentralized, romantic. Anyone can be a developer, pseudonymous and anonymous members are welcome. Motives or second agendas are not questioned in crypto utopia.
Polkadot, cat herders, magicians, Vitalik, core devs, Ethereans, ProgPOW, classicists. …