Command Chain Protocol (C2P)
Command Chain Protocol (C2P)[edit]
Command Chain Protocol (C2P) is a blockchain security protocol which may be integrated into different types of blockchains to create new consensus algorithms.[1][2] For example, a Proof-of-Work (PoW) blockchain which integrates C2P would then become a PoW-C2P consensus algorithm.
C2P was created by the ILCoin Development Team. It was released in 2019.[1][3][4][5] The main function of C2P is to prevent a 51% attack of the blockchain[6][7][8][5]; both internal attacks and external attacks.
Different Security Layers[edit]
C2P operates by utilizing a 3-tier system of full nodes.[2] Each level of full nodes communicates with the other two levels to forge each mined block. At the base, the normal full nodes help to generate transactions and synchronize with the entire network.[2] Once the transactions have been generated, they are shown to the next level of full nodes, the validator nodes.[2]
The validator nodes work by verifying the validity of each transaction, then cross-referencing transactions with a list of blocked wallets. Once the transactions have been verified, they are given to the third and final tier, the admiral nodes (master nodes).[2]
Admiral nodes provide signatures for each block which are created based upon timestamps, the previous block’s signature and other unannounced factors. Due to these varying factors, each admiral node’s signature is unique for every block.[2][5]
Due to the validator nodes’ ability to block wallets, malicious wallets which have been involved in attacks may be neutralized. This neutralization prevents coins proven to be involved in illegal activities from being moved from any wallet on the list of blocked wallets.[1][2][5]
Palo Alto Certification[edit]
The ILCoin Development Team tested the validity of the Command Chain Protocol by contracting the company Palo Alto Networks (an American multinational cybersecurity company) to perform white hat tests.[6][7][8] Palo Alto assigned EuroDigital (Hungary branch) to perform four weeks of continuous testing for rollback attacks, 51% attacks, fork attacks, and design flaw attacks.[1][2][3][5] After such time had elapsed, EuroDigital had concluded they could not infiltrate the protocol or subvert the protocol in any form. Palo Alto Networks then awarded the ILCoin Development Team with a certificate proving C2P is quantum and 51% attack resistant on a SHA-256 based blockchain.[6][7][8]
References[edit]
- ↑ 1.0 1.1 1.2 1.3 Reader, Posted by Brown, Contributing. "Securing Crypto Industry with C2P Protocol". orlandosentinel.com. Retrieved 2019-06-18.
- ↑ 2.0 2.1 2.2 2.3 2.4 2.5 2.6 2.7 Zafar, Tanvir (2019-06-04). "The ILCoin C2P: A Security Solution That Blockchain Desperately Needs". Hacker Noon. Retrieved 2019-06-18.
- ↑ 3.0 3.1 Koksal, Ilker. "Another Big Question in Blockchain Market: Safety. It seems solved!". Forbes. Retrieved 2019-06-18.
- ↑ Yavuz, Maria (2019-06-10). "Crypto Platform Says It Aims to Solve Bitcoin Scalability Issue". Cointelegraph. Retrieved 2019-06-18.
- ↑ 5.0 5.1 5.2 5.3 5.4 "Command Chain Protocol: PoW with Bulletproof Technology Under the Hood". Coinspeaker. 2019-04-29. Retrieved 2019-06-18.
- ↑ 6.0 6.1 6.2 GmbH, finanzen net. "Palo Alto Networks Partner Has Successfully Certified ILCoin's C2P Protocol for Quantum Resistance | Markets Insider". markets.businessinsider.com. Retrieved 2019-06-18.
- ↑ 7.0 7.1 7.2 "Palo Alto Networks Partner Has Successfully Certified ILCoin's C2P Protocol for Quantum Resistance | Ask.com". markets.ask.com. Retrieved 2019-06-18.
- ↑ 8.0 8.1 8.2 "Palo Alto Networks Partner Has Successfully Certified ILCoin's C2P Protocol for Quantum Resistance". finance.yahoo.com. Retrieved 2019-06-18.
Command Chain Protocol (C2P)[edit]
This article "Command Chain Protocol (C2P)" is from Wikipedia. The list of its authors can be seen in its historical and/or the page Edithistory:Command Chain Protocol (C2P). Articles copied from Draft Namespace on Wikipedia could be seen on the Draft Namespace of Wikipedia and not main one.