What is ASIC (Application-Specific Integrated Circuit) ?

Advanced
March 29, 2023
Read time:
9m

Application-Specific Integrated Circuit is an integrated circuit specifically designed for a particular purpose in a system. It is frequently used in mining cryptocurrencies such as Bitcoin, Ethereum, and Litecoin.


Use of ASICs in cryptocurrencies

As previously mentioned, ASICs are often involved in the process of mining cryptocurrencies. In this process, they solve complex mathematical algorithms when processing transactions and adding new blocks to the blockchain.


ASICs are a popular tool due to their efficiency in executing cryptographic algorithms in comparison to traditional computer processors (CPUs) or graphics cards (GPUs). They are also energy-efficient, as they do not use additional mechanisms or components that are redundant to the given task itself. Thus, they can process large amounts of data with minimal energy consumption.


However, the use of ASICs in mining is now dominated by large companies, resulting in the centralization of processes and a decrease in the number of individual miners.


Development of ASICs

Designing an ASIC is an undoubtedly challenging process that requires expertise in economics and electronic engineering, as well as considerable financial input.


However, the development process can be summarized and described in the following steps:

  1. Identify design requirements, such as function, required performance, power, production cost, and delivery time.


  2. Define a unique ASIC architecture tailored solely to the project's needs, which can involve considering how the various functional blocks will connect with each other.


  3. Design the electronic circuit using a CAD program, creating each functional block per the requirements and assembling them into an electronic schematic. Additional components such as power supply or data throughput must be considered for the circuit to function correctly.


  4. Create simulation and test models to evaluate the designed system's performance and perform optimization before production begins.


  5. Move to the final stage, which is the physical production of the system, involving sophisticated technologies like lithography and often carried out by specialized third parties. The designer's role at this stage is limited to selecting the proper manufacturer, undergoing verification, and ongoing circuit testing.


Providing a manufacturing timeline for ASICs might be problematic, as the timing varies significantly according to the scale of production, complexity of the circuit, chosen manufacturing method, and availability of manufacturing technologies. However, the time to complete the design should typically be estimated from a few months.


Furthermore, the dynamic development of ASIC technology and its solutions may lead to the relatively quick obsolescence of older models, creating the necessity to replace/modify them extensively, which generates high costs for the miner.


Summary

Application-Specific Integrated Circuit (ASIC) is an electronic circuit designed for a specific goal, such as mining cryptocurrencies like Bitcoin. ASICs are highly coherent and energy-efficient, allowing them to process large amounts of data with minimal energy consumption.


However, designing ASICs is a challenging and expensive process, and their use in cryptocurrency mining has led to the centralization of the process.

Complete quiz
What is ASIC (Application-Specific Integrated Circuit) ?
Share this article
Explore other articles
Intermediate

NFT Royalties

In the world of NFTs, royalties represent the pre-set percentage of the sale that is transferred to the original creator. Payments are made to creators for each use or sale of their work. Royalties can be specified in the smart contract on the blockchain network or negotiated with the buyers upon the initial sale.
Intermediate

What is leverage?

Leverage and margin are crucial tools that traders can use to increase their potential profits or losses on cryptocurrency investments. Leverage works by using borrowed funds, and margin controls the risk of loss.
Intermediate

Spoofing

Spoofing is a technique that involves falsifying information, such as IP or e-mail addresses, phone numbers, or login details, to deceive a system or user and gain unauthorized access. Spoofing can be employed in various attacks, including phishing, DDoS, or man-in-the-middle.