The whole point of encrypcurrency is to solve financial transactions problems. (Actually, that’s the whole point of computers—something many people tends to forget.) Encrypcurrency solves problems that involve secrecy, authentication, integrity, and dishonest people when do the transactions.

Introduction to Protocols

A protocol is a series of steps, involving two or more parties, designed to accomplish a task. This is an important definition. A “series of steps” means that the protocol has a sequence, from start to finish. Every step must be executed in turn, and no step can be taken before the previous step is finished. “Involving two or more parties” means that at least two people are required to complete the protocol; one person alone does not make a protocol. A person alone can perform a series of steps to accomplish a task (like baking a cake), but this is not a protocol. (Someone else must eat the cake to make it a protocol.) Finally, “designed to accomplish a task” means that the protocol must achieve something. Something that looks like a protocol but does not accomplish a task is not a protocol—it’s a waste of time.

Protocols have other characteristics as well:

— Everyone involved in the protocol must know the protocol and all of the steps to follow in advance.

— Everyone involved in the protocol must agree to follow it.

— The protocol must be unambiguous; each step must be well defined and there must be no chance of a misunderstanding

— The protocol must be complete; there must be a specified action for every possible situation.

The protocols in this encrypcurrency design are organized as a series of steps. Execution of the protocol proceeds linearly through the steps, unless there are instructions to branch to another step. Each step involves at least one of two things: computations by one or more of the parties, or messages sent among the parties.

What is Encrypcurrency Protocol?

An encrypcurrency protocol is a protocol that uses cryptography. The parties can be friends and trust each other implicitly or they can be adversaries and not trust one another to give the correct time of day. An encrypcurrency protocol involves some cryptographic algorithm, but generally the goal of the protocol is something beyond simple secrecy. The parties participating in the protocol might want to share parts of their secrets to compute a value, jointly generate a random sequence, convince one another of their identity, or simultaneously sign a contract. The whole point of using cryptography in a protocol is to prevent or detect eavesdropping and cheating. If we have never seen these protocols before, they will radically change our ideas of what mutually distrustful parties can accomplish over a computer network. In general, this can be stated as:

— It should not be possible to do more or learn more than what is specified in the protocol.

This is a lot harder than it looks. In some of them it is possible for one of the participants to cheat the other. In others, it is possible for an eavesdropper to subvert the protocol or learn secret information. Some protocols fail because the designers weren’t thorough enough in their requirements definitions. Others fail because their designers weren’t thorough enough in their analysis. Like algorithms, it is much easier to prove insecurity than it is to prove security.

The Skipjack Encrypcurrency Protocol

Skipjack mission is to create a verified and centralized distributed platform for value exchange, a global currency protocol that enables a payment system that is easier, safer, and faster to use than paper money or cryptocurrency. In addition, Skipjack will ensure that the majority of the economic value generated by the platform is fairly distributed to the community through accounts created, to create a more balanced distribution of resources.

Skipjack seeks to address three issues within digital currencies: verification of speed transactions, usability of applications, and efficiency of transactions. Skipjack makes significant improvements by

1) Forming a matching block superencryp to verify network

2) Increasing overall skipjack dime supply, and creating multiple efficiency platform and mobile encryptrade apps, and

3) Designing a centralized system managed by Fiestel Core Network (FCN) as central bank with less human interface.

4) Improving security breach by designing a hybrid protocol and multi-layer encryption.

Skipjack is a new currency that the new term as encrypcurrency. Skipjack is a general purpose encrypts digital currency. It is programmable money backed with asset. An encrypcurrency (or encryp currency) is a digital asset designed to work as a medium of exchange that uses encryption algorithm to secure its transactions, to control the creation of additional units, and to verify the transfer of assets. Encrypcurrency are classified as a subset of digital currencies and are also classified as a subset of alternative currencies and virtual currencies.

Skipjack is an encryption algorithm for the transmission of information (voice data in particular). It uses the Diffie-Hellman key exchange algorithm for the distribution of the cryptographic session keys between peers. The Skipjack algorithm was classified as an NSA Type 2 encryption product. It is using Clipper Chip for encrypt transaction. The algorithm was initially classified as SECRET, so that it could not be examined in the usual manner by the encryption research community. It used a 512-bit key and a symmetric cipher algorithm, similar to DES. Data is encrypted in blocks of 64 bits, using an unbalanced Feistel network with 32 rounds with more security than bitcoin and difficult to brute force. The new skipjack algorithm was developed to overcome the existing traditional digital currency which currently having a lot of weakness.

Skipjack, created in 2018, is the first centralized encrypcurrency. Skipjack and its derivatives use Feistel Core Network (FCN) designed with Artificial Intelligence (AI) Superencryp Block act as Central Bank that centralized control as same to centralized electronic money and central banking systems. The centralized control is related to the use of skipjack’s superencryp blockchiper transaction database in the role of a distributed ledger.

Encryp currency (encryp money) or called as Skipjack Dime is a type of currency available only in digital form, not in physical (such as banknotes and coins). It exhibits properties similar to physical currencies, but allows for instantaneous transactions and borderless transfer-of- ownership. Examples include virtual currencies and cryptocurrencies or even central bank issued “digital base money“. Like traditional money, these currencies may be used to buy physical goods and services, but may also be restricted to certain communities such as for use inside an on-line game or social network. Encryp currency is a money balance recorded electronically on a stored-value card or other device. Another form of electronic money is network money, allowing the transfer of value on computer networks, particularly the Internet. Encryp money is also a claim on a private bank or other financial institution such as bank deposits.

Understanding the Skipjack Protocol Design: The Players

To help demonstrate understand how skipjack protocols, I have enlisted the aid of several people (see Table 1.1). Alice and Bob are the first two. They will perform all general two- person protocols. As a rule, Alice will initiate all protocols and Bob will respond. If the protocol requires a third or fourth person, Carol and Dave will perform those roles. Other actors will play specialized supporting roles; they will be introduced later.

Arbitrated Protocols

An arbitrator is a disinterested third party trusted to complete a protocol. Disinterested means that the arbitrator has no vested interest in the protocol and no particular allegiance to any of the parties involved. Trusted means that all people involved in the protocol accept what he says as true, what he does as correct, and that he will complete his part of the protocol. Arbitrators can help complete protocols between two mutually distrustful parties.

In the real world, lawyers are often used as arbitrators. For example, Alice is selling a car to Bob, a stranger. Bob wants to pay by check, but Alice has no way of knowing if the check is good. Alice wants the check to clear before she turns the title over to Bob. Bob, who doesn’t trust Alice any more than she trusts him, doesn’t want to hand over a check without receiving a title.

Skipjack Basic Protocols

Encryption Algorithms Contained in Skipjack Skipjack may contain one or more of the following encryption algorithms. Accordingly, Skipjack containing encryption are subject to the U.S. Export Administration Regulations and may be controlled for National Security (NS), Anti Terrorism (AT), and/or Encryption (EI) reasons.

The primary function of encryption in Skipjack falls into two categories:

  1. Data Privacy (confidentiality – encrypting user data)
  2. Administrative – OAM&P (secure network management – administrative network functions) Data Hashing/Authentication

MD4

MD5 SHA-1 RIPEMD160 MICHAEL HMAC MMH CRC32

Key Exchange/ Asymmetric Algorithm Strength

DSA 1024, 1024/1536

Elliptic Curve Diffie-Hellman (ECDH) 163

RSA 1024, 2048, 4096

DSA 1024,2048 Diffie Hellman 1024, 1536 ElGamal 384

Data Security Encryption

Blowfish 128 CAST 128 DES-56 56, 64 Triple DES 112, 168, 192 DESX 56/64 RC2 40, 64, 128 RC4—128 40,

128 RC5 128 AES-128/l92/256 ARCFOUR 128 SEAL 160 IDEA 128 Skipjack.

SourceSkipjack Blue Paper.pdf

LEAVE A REPLY