Under The Hood

Untraceable payments

CryptoNote provides users with a completely anonymous payment scheme. CryptoNote implements the ring signature technology which allows you to sign a message on behalf of a group. The signature only proves the message was created by someone from the group, but all the possible signers are indistinguishable from each other.

Unlinkable transactions

Even if outgoing transactions are untraceable, everyone may still be able to see the payments you have received and thus determine your income. However, by using a variation of the Diffie-Hellman exchange protocol, a receiver has multiple unique one-time addresses derived from his single public key. After funds are sent to these addresses they can only be redeemed by the receiver; and it would be impossible to cross-link these payments.

Adaptive parameters

A decentralized payment system must not depend on a single person’s decisions, even if this person is a developer. CryptoNote has no hard-coded constants; magic numbers in the code are designed to be re-calculated based on the previous state of the network. Thus, they always change adaptively and independently, allowing the network to develop on its own.

Double-spending proof

Nobody is able to spend the same money twice — even if all his signatures are anonymous. Every signature contains a key image — a kind of fingerprint of the secret key. It is based on a one-way cryptographic function; this implies that given only the key image it is impossible to restore the corresponding secret key. These key images are used to prevent double-spending.

Blockchain analysis resistance

Non-repeating one-time addresses and mixed keys in ring signatures make the whole blockchain resistant to analysis. Each future transaction will only increase the entropy and create additional obstacles for an analyst.

Egalitarian proof of work

The proof of work mechanism acts as a voting system. Thus, it is crucial that during the voting process all the participants have equal voting privileges. CryptoNote brings this equality with its egalitarian proof of work, utilizing built-in CPU instructions, which are very hard and too expensive to implement in special purpose devices, but perfectly suitable for ordinary PCs.

Coin Name : CryptoPayAfrica

Symbol : CPA 

Block Times : 90 Seconds 

Money supply : 85,000,000 CPA 

Address Prefix : 5078 (Address Start with “cp”) 

Minimum fee : 0.01 CPA (that may change later) 

Algorithm : Chukwa

Ports : 13280

What is the Chukwa algorithm?

Chukwa is actually Argon2.

What is Argon2?

– Memory hard algorithm

– Source code is GPL-3.0 compatible

– Easily integrated into the core code, pools, etc

– Argon2 is the memory hard winner of the 2015 Password Hashing Competition (PHC).

Argon2 is also relatively unique in that it allows for a high-level of customisation in how the hashes are calculated including parameters such as:

– The number of threads to use (parallelism)

– Arbitrary resultant hash length

– Memory requirements (memory hardness)

– Number of iterations (time cost)

– The use of salts