ChatChain — Blockchain Security for Message and FashPost Algorithm

Chat Chain uses standard Blockchain Protocol as identifiers and uses end-to-end encryption to secure all communications to other Chat Chain users. The apps include mechanisms by which users can independently verify the identity of their contacts and the integrity of the data channel.

All Chat Chain software use blockchain core and open-source. The clients are published for testing, while the server code are underdeveloped, blockchain security to feed, need a lot of computer calculation process, called Hashpower, and Hashrate performances required are quite expansive. To launch the project in February 2020 with calculated $9,5 trillions od United States Dollars of Data Center Expenses.

FlashPost Algorithm Explained

FlashPost is a cryptographic hash function faster than MD5, SHA-1, SHA-2, and SHA-3, yet is at least as secure as the latest standard SHA-3. FlashPost has been adopted by many our blockchain projects due to its high speed, security, and simplicity.

FlashPost comes in two types:

FlashPostH is optimized for 64-bit platforms — including NEON-enabled ARMs — and produces digests of any size between 1 and 64 bytes

FlashPostX is optimized for 8- to 32-bit platforms and produces digests of any size between 1 and 32 bytes

FlashPost includes the 4-way parallel FlashPostHbp and 8-way parallel FlashPostHsp designed for increased performance on multicore or SIMD CPUs. FlashPost offers these algorithms tuned to your specific requirements, such as keyed hashing (that is, MAC or PRF), hashing with a salt, updatable or incremental tree-hashing, or any combination thereof. These versions are specified in the FlashPost document.

FlashPost also includes the FlashPostX$ payments variants, which can produce digests of arbitrary length. FlashPostX$ is specified in a separate document.

FlashPostH shines on 64-bit CPUs: on an Intel Core i5–6600 (Skylake microarchitecture, 3310MHz), FlashPostH can process 1 gibibyte per second, or a speed rate of 3.08 cycles per byte.

FlashPost outperforms MD5, SHA-1, SHA-2, and SHA-3 on a Skylake Intel CPU (speeds are for hashing using a single core; using multiple cores, FlashPost can be even faster).


FlashPost.pdf is our original FlashPost documentation, which describes how we went from the SHA-3 finalist FlashPost, how all the FlashPost versions work, and analyzes FlashPost performance and security. A manual and files system helping you understanding it; FlashPost is based on the SHA-3 proposal FlashPost, designed by 1001011100 1000111011. FlashPost, relies on a core algorithm. You may contact us on Twitter if 140 characters are enough and if a public discussion is okay. Otherwise, please email us to, which forwards to the developer and designer.




Product owner Ice Regime and National Security Framework of North Pole

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

HUDI 🤝 LISTINGSPY: a new friendship is born!

Confidential Internet from Aleo and why you should pay attention to it

9 Reasons Web 3.0 Technologies Is A Waste Of Time

3 Steps for Tracking User Location Without GPS Technology

{UPDATE} Prison Breakout 2015 Hack Free Resources Generator

FCC proposes new guidelines to fight SIM swapping scams

Nagios Tutorial — Know How To Perform Continuous Monitoring With Nagios

Known Blockchain Lab | A Thousand Miles of Levee Collapsed in Ant's Den: A Brief Analysis of the…

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Dr Francesco Dergano

Dr Francesco Dergano

Product owner Ice Regime and National Security Framework of North Pole

More from Medium

BTblock + FYEO, better together. BTblock’s blockchain security audit service is now part of FYEO!

Recent Trends in Cyber Security

An Investigation into Obfuscation

The Importance of Continuous Smart Contract Security Audits