Misunderstandings in the bitcoin community have led to false conclusions about the way that bitcoin works. The bitcoin mining process is fundamentally competitive, and personal gains are made through competition, regardless of how it appears. The complex reality is counter-intuitive, but understanding the differences among miners’ approaches to processing can disabuse us of the notion of a ‘standard’ block. Comparing the bitcoin to Hashcash eliminates false beliefs about the bitcoin hashing algorithm, verifies that each individual block is unique, and demonstrates that each individual miner acts independently of the others.
Many common but false beliefs in the bitcoin community have led to common misunderstandings, such as the ‘selfish miner attack’ [1]. Some of these beliefs arise from misunderstandings about the bitcoin block. These misunderstandings have led, in turn, to false conclusions on blocksize debates and an incorrect understanding of the way that bitcoin works. Simply put, there is no such thing as a consistent block before it is mined and included within the chain.
WHAT IS A BLOCK?
A block does not emerge until a hash puzzle has been solved. In attempting to solve a proof or work a puzzle, each miner takes a set of transactions, adds a timestamp, and then adds a nonce. This is a highly simplified version of what actually occurs, but this process captures the basics of the block creation process. For several reasons, there is flexibility in the timestamping protocol. First, there is latency between nodes and, more importantly, exact timekeeping is not required. Nodes are allowed some variation in their system times if they remain within an acceptable range. The time range function used by bitcoin mirrors several authentication protocols such as Kerberos [4] but with a wider drift range. Bitcoin is a far more forgiving protocol [6]. The bitcoin protocol is designed to allow for a wide range of time discrepancies, and it discards any discovered block that incorporates a timestamp outside its large defined range. This range is calculated based on two factors. 1. The timestamp in a block must be larger than the median distance from the timestamps recorded in the previous 11 mined blocks. 2. It must be lower than the ‘network-adjusted time’ plus 7,200 seconds. Note that the median timestamping function has a limiting adjustment in which a difference limit of 4,200 seconds is the maximum possible adjustment allowed. Each node polls the nodes to which it is connected using a ‘network-adjusted time’ function, which is calculated using the median of the timestamps returned by all the nodes connected to the local node.

AN ALTERNATIVE STRATEGY
It is highly unlikely that we would find the following strategy used by a miner because it is more difficult to ensure sorting order than to update a nonce. However, we present it for illustrative purposes. It is feasible to set a standard nonce that is never updated and update the order of transactions. Each possible ordering of transactions in a possible block solution will lead to a separate proof or attempt at a work solution. Simply changing the order of transactions without updating the nonce is, in itself, a way to create a new hash value that can be checked against the PoW difficulty requirements. Reordering of transactions is a combinatorial permutation problem [6]. The difficulty with this scheme would be in creating a system faster than the existing mining solutions based on ASIC hardware. The number of possible solutions to a reordering of transactions is derived from a factorial calculation of the number of transactions in the possible block. Moreover, because there is a wide range of acceptable timestamps, these could be adjusted to each possible solution based on permutations in the time range to further extend the number of possible PoW solutions. Ignoring the increased number of permutations that derive from a change in timestamps, we can calculate the number of possible permutations that can be used as a possible block solution as follows: where n indicates the number of possible permutations obtained through reordering transactions and indicates the set of combinational permutations of the transactions for block . If we estimate the maximum number of transactions in a 1MB block to be defined as (1) five transactions/second and (2) 600 seconds (average)/block, we obtain 3,000 transactions/block, which equates to n = [(ti)!] = 3000! = 4.149 x 109130 possible transaction combinations even before accounting for the timestamps. A more accurate calculation based on existing conditions would be derived through a range based on the existing moving average target of the mean rate of transactions that are included in a block. At the time of writing, this range is 1,049–1,760 with an expected range based on confidence interval. At this level, we still observe the range of permutations in the order of [1.343×102715,5.833×104949] permutations. Even at the lower bound, this order of difficulty exceeds the calculations of the hash itself. In fact, the lowest number of transactions that have been included in a block in the previous two-year period was 248 transactions. At this volume, the number of combinations would be n=5.193×10487. Through this exercise, we can quickly recognize that the probability of two mining nodes working on the same transaction order at the same time is phenomenally small. It is more likely that the same SHA-256 value would be returned as a collision between two separate blocks than within a single block to be calculated in two locations. This logic might seem counterintuitive to many people because it seems likely that each miner would process the same transaction data in the same order. However, reality is more complex. If a transaction were broadcast close to one mining node and were more distant, in terms of latency, than another, then there would be a delay in the receipt of the transaction at the more distant node. When we then incorporate other transactions that might be closer to the second node than to the first node, we can quickly obtain an intuitive understanding of the differences in ordering. At node 1, we would expect the following order to result, Tx0 Tx1; at node 2, we would expect the order to be Tx1 Tx0.

THE HASHING ALGORITHM USED IN BITCOIN.
There is a common, but false, belief that Adam Back is the original source of the hash puzzle used in bitcoin. This belief derives from the paper’s references to ‘Hashcash’ [2]. Instead, we find the base algorithm defined on page 4 of ‘DOS-resistant authentication with client puzzles’ [12]. The authors did not release code, and a modified protocol and code were used in the bitcoin core release of 2009. The original implementation of Hashcash is available via the Internet Archive project here and the original code here. The false belief that Hashcash was ‘used as the mining function in bitcoin’ can be quickly dispelled by comparing the codes used in each. This exercise will demonstrate that the variables and functions written for bitcoin, such as nTotalLower and nTargetValue, differ radically from the functions used in Hashcash. It was implemented simply in bitcoin, where comparisons, such as the following, were used instead of schemes that are more difficult to implement: if(hash <= hashTarget) {pblock->nNonce = tmp.block.nNonce; assert(hash == pblock->GetHash()); and // Check proof of work matches claimed amount if(CBigNum().SetCompact(nBits) > bnProofOfWorkLimit) return error(“CheckBlock() : nBits below minimum work”); if(GetHash() > CBigNum().SetCompact(nBits).getuint256()) return error(“CheckBlock() : hash doesn’t match nBits”); Other methods, including seeking matched hash collisions, such as are found in Hashcash, could have been incorporated; but this would have involved additional changes that would have made the initial implementation of bitcoin more difficult. The originally incorporated code derives from implementations developed by Wei Dai and Steve Reid.BLOCKS ARE UNIQUE
What the reader should take away from this exercise is that each individual block is unique. This has become more complicated since the introduction of mining pools, in which groups of individual miners act in a concerted manner to solve a shared problem. However, that scenario does not change the way that transactions are distributed in a block. The effect is that each mining pool mimics a large mining node. To many people, it seems counterintuitive; however, it is critically important to remember that each individual miner acts independently of all other miners in the system. What is even more counterintuitive is that each individual attempt is completely independent and unrelated to all previous attempts. Each attempt to solve a bitcoin block puzzle is like a coin toss in the sense that the results are truly independent from all other coin tosses.REFERENCES
[1] | I. Eyal, & E. Gun Sirer, “Majority is not Enough: Bitcoin Mining is Vulnerable” 2013 |
[2] | “Bitcoin: A Peer-to-Peer Electronic Cash System” 2008 |
[3] | J.S. Coron, Y. Dodis, C. Malinaud, P. Puniya. “Merkle-Damgård revisited: How to construct a hash function.” In Advances in Cryptology–CRYPTO 2005, 2005 Aug 14 (pp. 430-448). Springer Berlin Heidelberg |
[4] | C. Neuman, T. Yu, S. Hartman, & K. Raeburn,“The Kerberos Network Authentication Service (V5),” Network Working Group, RFC 4120, 2005 |
[5] | “Open-source IEC 61850 MMS/GOOSE server and client library” |
[6] | TechNet, Viewed from: “Maximum tolerance for computer clock synchronization”, 2005 |
[7] | L. Lovasz, “Combinatorial Problems and Exercises,” Publishing House of the Hungarian Academy of Sciences, Budapest, 1979 |
[8] | W. Feller, “An introduction to probability theory and its applications,” 1957 |
[9] | M. S. Bartlett. “An Introduction to Stochastic Processes, with Special Reference to Methods and Applications.” Cambridge University Press, Cambridge/New York, 1980 |
[10] | A. Stuart. “Kendall’s Advanced Theory of Statistics.” Wiley, Chichester, 1994 |
[11] | U. Narayan Bhat and G. K. Miller. “Elements of Applied Stochastic Processes.” Wiley-Interscience, Hoboken, N.J. 2002 |
[12] | Aura, Tuomas, Pekka Nikander, and Jussipekka Leiwo. “DOS-resistant authentication with client puzzles.” In Security Protocols, pp. 170-177. Springer Berlin Heidelberg, 2000 |