12
CybCSec Coin Cyber Crypto Security The New Standard in Privacy – an Unrivalled Combination of Anonymity, Security, and Speed. Revision 3.1 Whitepaper November 2017

XCS Whitepaper 3.1 Web - CybCSec · PDF fileber Security features in 2018, ... which each node (or onion router) in the path ... XCS_Whitepaper_3.1_Web CybCSec

  • Upload
    letram

  • View
    213

  • Download
    1

Embed Size (px)

Citation preview

Page 1: XCS Whitepaper 3.1 Web - CybCSec · PDF fileber Security features in 2018, ... which each node (or onion router) in the path ... XCS_Whitepaper_3.1_Web CybCSec

Cyber Crypto Security CybCSec

www.CybCSec.com1

CybCSec CoinCyber Crypto Security

The New Standard in Privacy – an Unrivalled Combination of

Anonymity, Security, and Speed.

Revision 3.1

Whitepaper November 2017

Page 2: XCS Whitepaper 3.1 Web - CybCSec · PDF fileber Security features in 2018, ... which each node (or onion router) in the path ... XCS_Whitepaper_3.1_Web CybCSec

CybCSec Cyber Crypto Security

© 2017 CybCSec Solutions2

CybCSec CoinCyber Crypto Security

The New Standard in Privacy – an Unrivalled Combination of

Anonymity, Security, and Speed.

Whitepaper PublicationNovember 2017

Contact Information:www.CybCSec.com

[email protected]

Page 3: XCS Whitepaper 3.1 Web - CybCSec · PDF fileber Security features in 2018, ... which each node (or onion router) in the path ... XCS_Whitepaper_3.1_Web CybCSec

Cyber Crypto Security CybCSec

www.CybCSec.com3

OverviewThis Whitepaper will explore CybCSec‘s unique functions, and how it can play a role in the global payment, communication and securi-ty industries.

CybCSec stands for “Cyber Crypto Security” and the name is pronounced “CybSec”, the extra “C” in CybCSec is silent.

CybCSec is an ultra-secure, anonymous, and untraceable cryptocurrency. Based upon the solid foundation of Bitcoin CybCSec is new, unique and inherently useful.

CybCSec, in addition to its best in class Ano-nymity features, will be the first cryptocurren-cy to offer legitimate cybersecurity applica-tions for the end user.

CybCSec is the first cyber security cryptocur-rency. It was devised and created by CybCSec Solutions, a Scandinavian company comprised of experienced cybersecurity professionals.

CybCSec brings privacy and personal securi-ty in cryptocurrency to the next level.

CybCSec will be rolling out multiple new Cy-ber Security features in 2018, positioning itself not only as a leading innovative cryptocur-rency, but also a computer security and cy-bersecurity provider. All services will be linked to our cryptocurrency coin.

CybCSec offers wallets for a range of oper-ating systems – Windows, Linux and Mac with more coming in the future.

Our wallet systems already include applica-tions such as Smart Contracts and Secure Messaging. The Smart Contracts are avail-able for more advanced users.

Phase 2 will see the Smart Contract feature become more user friendly so that all users can implement it as part of their business op-erations.

Phase 3 will include features such as Antivirus, Intrusion sensors, and additional proprietary blockchain-based security innovations under development.

CybCSec estimates a wallet user base of over 250,000 active wallets and customers by the middle of 2018 and over 500,000 by mid 2019. These forecasts can be considered conser-vative.

CybCSec also plans to enter the gaming and payment processing sectors with negotia-tions currently underway with gaming devel-opers and payment solution companies in Asia, Europe and North America.

Page 4: XCS Whitepaper 3.1 Web - CybCSec · PDF fileber Security features in 2018, ... which each node (or onion router) in the path ... XCS_Whitepaper_3.1_Web CybCSec

CybCSec Cyber Crypto Security

© 2017 CybCSec Solutions4

IntroductionWhat is CybCSec?

CybCSec is the first cyber security orientat-ed cryptocurrency to emerge in the cryp-tocurrency space. Created by CybCSec Solutions, a Scandinavian company, Cyb-CSec is going to change the way crypto-currency and personal security operates in the future.

Launched in July 2017, CybCSec Solutions are set to roll out many of their products and services in phases in 2018 and the years that follow. All of our services will be linked to our cryptocurrency coin.

CybCSec is a Proof of Stake asset. Our proof of stake offers 8% annual interest minting capability so users can stake additional coins if they choose to support the network.

All CybCSec coins are stored on the block-chain and transferred over the internet be-tween digital ‘Wallets’. CybCSec offers wal-lets for a range of operating systems such as; Windows, Linux and Mac.

Cryptocurrency Unleashed

Cyb CSec brings a new and innovative ele-ment to the cryptocurrency marketplace; Cyber Security. With a range of services set to release in 2017, 2018 and many years to fol-low, CybCSec is paving the way for new and emerging cryptocurrencies.

CybCSec will exponentially grow its ecosys-tem once our initial products launch in 2017. CybCSec will introduce Secure Messaging (Communications) and Smart Contracts as part of the initial launch. Later on a Secure File Transfer function, and a full Antivirus suite (Q4 2018) are planned.

CybCSec Specifications

Algorithm: PoSV3

Type: Proof of Stake (PoS)

Coin Name: CybCSec Coin

Coin Ticker: XCS

RPC Port: 6600

P2P Port: 6601

PoS Percentage: 8% per Year

Coin Supply: 250,000,000

Coinbase Maturity: 100 Blocks

Target Spacing: 64 Seconds

Target Timespan: 1 Block

Transaction Confirmations:

6 Blocks

Mined Blocks before Confirmation:

20 Blocks

Min Transaction Fee: 0.01 XCS

Stage Age: 2 Hours

Dedication Tor Nodes:

2

Speed: 20x Faster Than Bitcoin Network Transactions

Transactions Capability per Minute:

6,000

Page 5: XCS Whitepaper 3.1 Web - CybCSec · PDF fileber Security features in 2018, ... which each node (or onion router) in the path ... XCS_Whitepaper_3.1_Web CybCSec

Cyber Crypto Security CybCSec

www.CybCSec.com5

WalletsCybCSec offers a range of wallets avail-able for the following operating systems (as shown below in the wallet screenshot). The CybCSec Wallet is a multi-functional digital wallet which allows users to manage their wallet and customise it to suit their prefer-ences. Users can carry out the following func-tions: Overview different types of balances and transactions histories, send and receive Cyb C Sec coins to and from other CybCSec us-ers, Stealth text messaging to other CybCSec wallet users, manage wallet settings, wallet backup and a wallet tool feature plus more user functionality.

The CybCSec computer wallet is a “Multi-Wal-let”, which means users can create so multiple

wallets all under the same wallet. This feature eliminates the need for several computers which is more efficient for users. This wallet separation features will benefit end users, merchants and shopping businesses also.

Later on CybCSec coins are also available to use as a payment solution using our An-droid app wallet. This wallet combines both CybCSec and Bitcoin crypto coins and either can be used in stores that accept both as a method of payment. Available Wallets: Win64, Linux and Mac (macOS 10.12 and later).

To download the wallet for your preferred operating system simply visit www.CybCSec.com

Page 6: XCS Whitepaper 3.1 Web - CybCSec · PDF fileber Security features in 2018, ... which each node (or onion router) in the path ... XCS_Whitepaper_3.1_Web CybCSec

CybCSec Cyber Crypto Security

© 2017 CybCSec Solutions6

CybCSec Cryptocurrency FeaturesCybCSec employs several technologies to en-sure the coin, wallet, features and operations

are completely secure, anonymous, unique and efficient.

Tor Network Integration

Tor is a distributed overlay network designed to anonymize low-latency TCP-based appli-cations such as web browsing, secure shell, and instant messaging. Clients choose a path through the network and build a “circuit’’, in which each node (or onion router) in the path knows its predecessor and successor, but no other nodes in the circuit. Traffic flowing down the circuit is sent in fixed-size “cells”, which are unwrapped by a symmetric key at each node (like the layers of an onion) and relayed down-stream.

Otherwise known as ‘The Onion Router’, Tor di-rects internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays to conceal a user’s lo-cation and usage from anyone conducting network surveillance or traffic analysis.

Using Tor, CybCSec is able to protect their wal-let user’s privacy while maximizing confidential communication abilities. Additional informa-tion can be found on Tor www.torproject.org.

Ring Signatures

In cryptography, a ring signature is a type of digital signature that can be performed by any member of a group of users that each have keys. Therefore, a message signed with a ring signature is endorsed by someone in a

particular group of people. One of the security properties of a ring signature is that it should be computationally infeasible to determine which of the group members keys was used to produce the signature.

Torclient

Entry guard

Middle relay

Tor network

Exit relay

Destination

Encrypted by TorNot encrypted by Tor

Page 7: XCS Whitepaper 3.1 Web - CybCSec · PDF fileber Security features in 2018, ... which each node (or onion router) in the path ... XCS_Whitepaper_3.1_Web CybCSec

Cyber Crypto Security CybCSec

www.CybCSec.com7

In a ‘ring’ of possible signers, all ring mem-bers are equal and valid. Outside observers can in no way tell which of the possible sign-ers in a signature group belongs to a user’s

account. Ring Signatures ensure that trans-action outputs are untraceable. More in-formation on Ring Signatures can be found here.

Multi Signature Transactions

Standard transactions on the CybCSec net-work could be called “single-signature trans-actions,” because transfers require only one signature — from the owner of the private key

associated with the CybCSec address. How-ever, the CybCSec network supports much more complicated transactions that require the signatures of multiple people before the

Every CybCSecis created with

a private key, which isa series of randomly

generated lettersand numbers.

Without this key, you cannot send the

CybCSec to othersor exchange

it for fiat currency

Multi-signature effectively breaks

each private key intomultiple pieces.

The idea is to store each piece separatety so hackers would haveto breach multiple

systems betore gettingthe private key

Every timeCybCSec is sent,

the private key changes lts value.

So you cannot re-use old

private keys

Multi-signatureis fairly newin CybCSec

but used by manypopular exchanges.You need a majority

ot the piecesto move the

CybCSec coin

How CybCSec Implements Multi-Signatures

Page 8: XCS Whitepaper 3.1 Web - CybCSec · PDF fileber Security features in 2018, ... which each node (or onion router) in the path ... XCS_Whitepaper_3.1_Web CybCSec

CybCSec Cyber Crypto Security

© 2017 CybCSec Solutions8

funds can be transferred. These are often re-ferred to as M-of-N transactions. The idea is that CybCSec coins become “encumbered”

by providing addresses of multiple parties, thus requiring cooperation of those parties in order to do anything with them.

Zero Knowledge Proof

In cryptography, a zero-knowledge proof or zero-knowledge protocol is a method by which one party (the prover) can prove to another party (the verifier) that a given state-ment is true, without conveying any informa-tion apart from the fact that the statement is indeed true. If proving the statement requires knowledge of some secret information on the part of the prover, the definition implies that the verifier will not be able to prove the state-ment in turn to anyone else, since the verifier does not possess the secret information.

Notice that the statement being proved must include the assertion that the prover has such knowledge (otherwise, the statement would not be proved in zero-knowledge, since at the end of the protocol the verifier would gain the additional information that the prover has knowledge of the required secret information).

If the statement consists only of the fact that the prover possesses the secret information, it is a special case known as zero-knowledge proof of knowledge, and it nicely illustrates the essence of the notion of zero-knowledge proofs: proving that one has knowledge of certain information is trivial if one is allowed to simply reveal that information; the challenge is proving that one has such knowledge with-out revealing the secret information or any-thing else.

For zero-knowledge proofs of knowledge, the protocol must necessarily require interactive input from the verifier, usually in the form of a challenge or challenges such that the re-sponses from the prover will convince the ver-ifier if and only if the statement is true (i.e., if the prover does have the claimed knowledge).

Prover Verifier

Proofs and Secret Data

Page 9: XCS Whitepaper 3.1 Web - CybCSec · PDF fileber Security features in 2018, ... which each node (or onion router) in the path ... XCS_Whitepaper_3.1_Web CybCSec

Cyber Crypto Security CybCSec

www.CybCSec.com9

Dual-key Stealth Addresses

These address are different from the standard addresses commonly used in cryptocurren-cies and allow for better privacy. A dual-key stealth address can be shared publicly by the recipient yet any transaction made out to this address can not be linked back to it. When the stealth address has been revealed to the payer(s), it will be enable the payee to receive infinite unlinkable payments. Meaning that each payment to a Stealth address computes

a new unused normal address on which the funds ought to be received, any eavesdropper will be unable to link the two addresses.

CybCSec is using the most up-to-date tech-nologies to ensure it is a superior coin to most alt-coins currently in circulation and that a solid foundation is laid for the future of its products and services and expanding eco-system.

How Stealth Addresses Work

Page 10: XCS Whitepaper 3.1 Web - CybCSec · PDF fileber Security features in 2018, ... which each node (or onion router) in the path ... XCS_Whitepaper_3.1_Web CybCSec

CybCSec Cyber Crypto Security

© 2017 CybCSec Solutions10

CybCSec InnovationsSecure Messaging

Protecting user private data or trace ele-ments in a safe and secure way is a priority of CybCSec. The messaging system allows to-

tal control of user data to provide a safe and secure way to manage information using the CybCSec wallet. Utilizing the AES-256-CBC al-gorithm, CybCSec users can enjoy safe and secure text transmissions.

Smart contracts

Smart Contracts otherwise known as digital contracts can establish computer automated

agreements which can be pre-programmed between two or more anonymous parties, en-abling them to trade and do business with each other without the need for any third parties.

Cipher Block Chaining (CBC) mode encryption

1. Rights holder publish ownershipinformation on the blockchain

3. Royalities and fees are delivered instantly. transparently and automatically based on the stakeholder information contained in the blockchain database

2. Use policies for registered works are written into smart contracts that automatically trans-fer usage rights

4. An open platform faciliitates infinite potential rotes, applications and business models

Page 11: XCS Whitepaper 3.1 Web - CybCSec · PDF fileber Security features in 2018, ... which each node (or onion router) in the path ... XCS_Whitepaper_3.1_Web CybCSec

Cyber Crypto Security CybCSec

www.CybCSec.com11

Using CHECKLOCKTIMEVERIFY and multi-sig-nature technology, CybCSec have introduced a robust and secure Smart Contract element that will change the way users conduct busi-ness.

Antivirus Suite

Antivirus or AV software will prevent, detect and remove malicious software from com-puter devices. Accessing a worldwide network of sensors, the CybCSec Antivirus will combat, predict and remove threats from user PC de-vices. This feature will be released in Phase 2.

Secure File Transfers

Enables users to access, manage and send files containing private data across a reliable data stream ensuring that user privacy is up-held at all times. This feature is critical to en-

sure private communications between users. This feature will be released in Phase 2.

Intrusion Sensors

CybCSec Intrusion sensors will detect and prevent malicious activity/intrusions or policy violations across ERS networks and systems. Employing a swift response activity to these threats and potential threats, this feature will be a trademark of the CybCSec coin. This fea-ture will be released in Phase 3.

Cyber Security

The protection of user computer systems from theft or damage to hardware, software or the information on them from either net-work access, data and code injection or sim-ply by malpractice by the user. This feature will be released in Phase 3.

Asset DetailsThe total supply of CybCSec coins was set at 250m coins, excluding minting production. This was established based on the anticipated re-quirement to release its features, innovations and partnerships.

However, we have since reduced our sales network, and sharpened focus on anonym-ity, security and fiat integration since em-ploying.

Furthermore, since employing our new team, we have made rapid, below budget progress in a number of other areas.

This will allow us to perform a significant coin burn. The exact date and quantity is yet to be determined, but will be announced in due course.

POS Minting

Proof-of-stake (PoS) is a type of algorithm by which a cryptocurrency blockchain network aims to achieve distributed consensus.

Most cryptocurrency mining requires spe-cialised and usually expensive hardware. CybCSec minting can be done on any com-puter. Coin rewards are spread out over the complete network rather than ending up in the wallets of one or two large miners. Each time minting generates a block, stakers help guard and process network transactions.

With an 8% annual „interest“ return, based upon the number of coins in a user wallets, coin holders are rewarded for investing long-term. This will increase the value of the coin as it discourages selling, and because it helps to stabilise the network.

Page 12: XCS Whitepaper 3.1 Web - CybCSec · PDF fileber Security features in 2018, ... which each node (or onion router) in the path ... XCS_Whitepaper_3.1_Web CybCSec

CybCSec Cyber Crypto Security

© 2017 CybCSec Solutions12

ConclusionCybCSec already stands as the most secure, anonymous and untraceable cryptocur-rency. Combined with a speed 20x faster than Bitcoin, and upcoming fiat integration, it has all the ingredients necessary to be both a store of value and an everyday currency.

Additionally, CybCSec have implemented plans to introduce a host of new security features and other products in the near future.

Our vision is to change the way cryptocurrency operates within any given ecosystem and provide a safer, more private and productive experience for cryptocurrency users worldwide.

For more information about CybCSec and its features please visit our website at www.CybCSec.com or contact us via email: [email protected]