#### Whether cryptocurrencies are really at risk of quantum hacking?

The question of whether Bitcoin and other cryptocurrencies based on Bitcoin's code can resist quantum computing divides the crypto community into two opposing groups. Crypto-enthusiasts continue to believe that cryptocurrencies and Bitcoin, in particular, can resist quantum technologies. Crypto-realists pay much more attention to the issue of quantum safety. Let's ...

Read more

Read more

#### Why does blockchain need shards?

Any fast-growing blockchain sooner or later faces the problem of scalability. The decentralization and security of blockchain are ensured by reaching a consensus between nodes and storing all the blockchain data in each node. Just imagine what a huge amount of data is growing every day, like a snowball! It ...

Read more

Read more

#### What is TON in fact. A critical view

In early 2018, sensational ICO from Pavel Durov raised 1.7 billion dollars. The distinctive feature of this mega - project is a skillful PR - no official statements from Pavel Durov and chronicle “leaks” of information on the project. Of course, Pavel Durov is a unique personality, the creator of ...

Read more

Read more

#### Is ICO market dead?

Even before the rapid dropping of Bitcoin and other cryptocurrencies, there was talk that the ICO market was defunct. And we must admit that this is not just talk. Here are some very indicative data of the ICORating report for the 3rd quarter of 2018:

Read more

**$1,819,585,090**is the total funding ...Read more

#### How do you choose new altcoins for investment?

*Currently, the ICO market is going through difficult times. Too many low-quality projects appeared in late 2017 and early 2018, and now they are only abandoned sites and useless tokens. Against this background, it is increasingly difficult for project founders to earn ...*

**How to choose a budding ICO for investment?**Read more

#### IS CRYPTOCURRENCY MARKET CRASHED OR LIVE?

In November, cryptocurrency market news caused horror and panic among many members of the crypto community. The owners of the cryptocurrency are stressed out watching bitcoin price and trying to calm their growing panic with positive bitcoin price predictions. Their counterparts with less strong stomach are trying to sell their ...

Read more

Read more

#### D-Wave sold 2000-qubit quantum computer last year

This article tells us D-Wave began to produce and sell quantum computers in 2011: first, it was a 128-qubit quantum computer, then a 512-qubit one and so on, up to a 2000-qubit quantum computer! Moreover, the main developer of DapCash project Dmitry Gerasimov has repeatedly received proposals to develop software ...

Read more

Read more

#### Shor’s algorithm against the blockchain

*Scientists are amazing people, they just can't live without inventions or discoveries. And then the whole world has to think what to do with these discoveries. For example, atomic energy is as useful as it is dangerous. We have an interesting situation with Shor's algorithm ...*

**Peter Shor and his algorithm**Read more

#### One important “but”: The Quantum Vulnerability

There is another important nuance, which concerns encryption algorithms, asymmetric ones in particular. When we talk about the cryptographic robustness of algorithms, we mean cryptanalysis performed through a use of

Read more

*. But***the classical computer***already exist. The difference between a classical computer and a quantum computer is that ...***quantum computers**Read more

#### The advantages and disadvantages of asymmetric algorithms and hybrid encryption

In comparing symmetric and asymmetric algorithms, we find out each type has its advantages and disadvantages. Thus, asymmetric encryption algorithms are more “cumbersome” when compared with symmetric ones. If the amount of data is the same, the asymmetric algorithm will take longer to process it. And the key is, respectively, ...

Read more

Read more

#### The Asymmetric Algorithm ECDSA

We have mentioned in detail, the asymmetric encryption and the RSA algorithm being outdated. We will now talk about another

Read more

*Unlike RSA, ECDSA is based on far more complex mathematical calculations. It is used only for digital ...***well - known algorithm of asymmetric encryption ECDSA (Elliptic Curve Digital Signature Algorithm).**Read more

#### DapCash ICO

We are pleased to announce the exact dates of DapCash ICO: Start - November 23, 2018. End - December 24, 2018. Before the start of the ICO, you still have the opportunity to buy DapCash coins with 10% discount! ICO will take place on the Kelvin Blockchain platform inside the ...

Read more

Read more

#### The Asymmetric Algorithm RSA

Asymmetric encryption was previously discussed in this article. One of the most recognized asymmetric encryption algorithms is RSA, named after the initials of its creators - Rivest, Shamir, and Adleman. The algorithm was developed since the mid-1970s and was patented in the US in 1983. In 1990, the RSA algorithm ...

Read more

Read more

#### Asymmetric Encryption

From our previous articles, general information about encryption, symmetric encryption, and its algorithms was discussed. Here, we will focus on asymmetric encryption. Asymmetric encryption applies two keys: the public key and private key, and so the encryption is called asymmetric.

Read more

**The public key**encrypts the message while the**private key**...Read more

#### We have done the load testing of DAP platform!

**Want to know what we did and what results we got? Read our brief report on the test results.**

*During testing, we evaluated the speed of the basic protocols, measured the number of transactions per second (TPS). Testing was organized as follows. In order to ...*

**Initial testing conditions**Read more

#### Symmetric encryption algorithms

Just as the title implies, this article is all about symmetric encryption. Without further ado, let’s head into the algorithms of symmetric encryption. One of the well-known and widely used algorithms of symmetric encryption was DES (Data Encryption Standard). This algorithm was developed by IBM Corporation (USA) in 1977. As ...

Read more

Read more

#### DapCash updates

So, we promised to tell you what new and interesting things would appear in our project. Here they are.

Read more

*This is one of our most important developments making our blockchain fast and convenient. Let's talk briefly ...***Private shards mechanism and different types of consensus will appear in DapCash.**Read more

#### Symmetric Encryption

You can read about encryption basic concepts in our previous article. Here we are talking about symmetric encryption. Symmetric encryption is characterized by the fact that the

Read more

**same key**is used to encrypt the original data and then decrypt it. The main goal of symmetric encryption is to transform the ...Read more

#### What is Encryption: basic concepts

Many a man associate encryption with military intelligence or the search for ancient treasures following mysterious notes. But in fact, encryption has long been our daily life. Every day we sit in front of computers, use electronic payments, VPN services, instant messengers, digital signature, etc. Encryption is used to exchange ...

Read more

Read more