Difference between revisions of "Main Page"

From SecureWiki
Jump to: navigation, search
(MAC QT Client)
(MAC QT Client)
Line 44: Line 44:
 
Official: http://securecoin.org/downloads/securecoin-mac.zip
 
Official: http://securecoin.org/downloads/securecoin-mac.zip
  
Local Mirror: http://securecoin.info/download/Securecoin-mac.zip
+
Local Mirror: http://securecoin.info/download/securecoin-mac.zip
  
 
==Getting Started==
 
==Getting Started==

Revision as of 22:51, 27 July 2015

SecureCoin[1] is a fast and secure cryptographic digital currency based on Bitcoin. The specifications have been carefully chosen to maintain Bitcoin’s economic model.

A single hashing algorithm poses a security risk because if it is compromised, the whole network is forever compromised. Multiple hashing algorithms enhance the security of the network by not only mitigating that risk, but also by adding an additional layer of complexity for any attacker to penetrate.

The aim of SecureCoin is to provide a secure, fast, and reliable network that is supported by active and involved developers. The coin was launched fairly with a staggered system and no coins mined before public launch.

Specifications

Reward Per Block: 5

Time Between Blocks: Every 1 minute

Difficulty Retarget: 500 blocks. Difficulty can only move a maximum of 100% up, or 50% down.

Reward halves: Every 2.1 million blocks

Block confirmations: 40

Transaction Confirmations: 1. Meaning transactions take ~1 minute to fully confirm.

Total Coin Supply: 21 million

Algorithms: Grøstl, Skein, BLAKE, BLUE MIDNIGHT WISH, JH, SHA-3

GUI: Unique design and optimizations

Launch: Fair launch with ascending rewards

Pre-mine: None

Source Code

Source code is available at the github repository for compiling on Linux and other platforms.

GitHub Repository: https://github.com/baritus/securecoin

Compiled Binaries

Windows QT EXE

Official: http://securecoin.org/downloads/securecoin-qt.zip

Local Mirror: http://securecoin.info/download/securecoin-qt.zip

MAC QT Client

Official: http://securecoin.org/downloads/securecoin-mac.zip

Local Mirror: http://securecoin.info/download/securecoin-mac.zip

Getting Started

Getting started is easy and requires only a couple of steps. Add the list of nodes below as is to your configuration file. For details on the configuration file, see the bottom half of this page.

Node List

—Copy below here—

addnode=us-east1.nodes.mywl.lt

addnode=us-ny1.nodes.mywl.lt

addnode=178.237.35.34:12567

addnode=209.188.16.220:12567

addnode=5.9.120.80:12567

ddnode=62.24.83.120:12567

addnode=78.27.191.182:12567

addnode=64.251.188.62:12567

addnode=108.53.178.39:12567

addnode=207.12.89.221:12567

addnode=193.87.209.44:12567

addnode=198.199.70.224:12567

Configuration File

For Windows:

The file AppData folder is hidden by default so make sure to enable viewing hidden files. Example: Windows drive(C:) -> Users -> *YourWindowsUsername*->AppData->Roaming->SecureCoin


For Mac:

Your securecoin.conf file should be in one of the following directories:

$HOME/Library/Application Support/SecureCoin/

OR

/Users/username/Library/Application Support/SecureCoin/

Press command+alt to show the library directory (if it is hidden) in the finder’s Go menu.


You can create a text file, add the nodes above, and put it in the directory for your operating system.

Connection Issues

If you are having trouble connecting to the network after adding the above. Visit http://digitalcoin.co/forums/index.php/topic,184 for a comprehensive list of network nodes.

More Information

Example Config file: https://bitcointalk.org/index.php?topic=270852.msg3038287#msg3038287

Creating your own config file: https://bitcointalk.org/index.php?topic=270852.msg3060316#msg3060316

Algorithms

Grøstl

Grøstl is an iterated hash function, where the compression function is built from two fixed, large, different permutations. The design of Grøstl is transparent and based on principles very different from those used in the SHA-family.

The two permutations used are constructed using the wide trail design strategy, which makes it possible to give strong statements about the resistance of Grøstl against large classes of cryptanalytic attacks. Moreover, if these permutations are assumed to be ideal, there is a proof for the security of the hash function.

Skein

Skein is based on the Threefish tweakable block cipher compressed using Unique Block Iteration (UBI) chaining mode while leveraging an optional low-overhead argument-system for flexibility. Skein supports internal state sizes of 256, 512 and 1024 bits, and arbitrary output sizes. The authors claim 6.1 cycles per byte for any output size on an Intel Core 2 Duo in 64-bit mode.

BLAKE

BLAKE is a cryptographic hash function that is based on Dan Bernstein’s ChaCha stream cipher, but a permuted copy of the input block, XORed with some round constants, is added before each ChaCha round.

BLUE MIDNIGHT WISH

BLUE MIDNIGHT WISH is a cryptographic hash function with output size of n bits where n = 224, n 256, 384 or 512.

JH

JH is a cryptographic hash function submitted to the NIST hash function competition by Hongjun Wu. Though chosen as one of the five finalists of the competition, JH ultimately lost to NIST hash candidate Keccak. JH has a 1024-bit state, and works on 512-bit output blocks.

SHA-3

SHA-3 uses the sponge construction in which message blocks are XORed into the initial bits of the state, which is then invertibly permuted. In the version used in SHA-3, the state consists of a 5×5 array of 64-bit words, 1600 bits total.

Concept Credits

BTC

SecureCoin’s inflation rate is the same as Bitcoin’s. The two will produce an identical number of coins and at the same rate. There is no need to change a tried and tested economic model. This is also why SecureCoin is a version of bitcoin, because it keeps the same economic orientation. LTC borrowed the same economic model as BTC and it is one of the major reasons for its success.

YAC

YAC was one of the first coins to get CPU mining where it currently is and helped contribute to SRC’s functionality.

SIF

Sif deserves a mention for being the first to implement multiple hashing algorithms and proving the concept can work. The economy was however not successful.

DGC

Digitalcoin’s fair launch policy and community funded efforts helped form the concept for SRC.

References

  1. SecureCoin Official Site 25 July 2015

External links