Capital Technologies & Research Proposes a Decentralized Communication Protocol for the High-yield Mobile Market Segment

in #capitaltechnologies6 years ago (edited)

Rise of the Internet and new networking technologies have triggered a large number of security approaches towards web communication protocols. Online activities and voice communications rely heavily on secure communication protocols to protect the confidentiality of submitted information and ensure the authenticity of parties involved in communication process. Secure protocols are therefore designed to secure certain properties of a network and avoid all known attacks on communication channels.

https://www.mycapitalco.in

Capital Technologies & Research (CT&R) addresses the issues of secure internet communication from the perspective of the participants in the communication process. For this purpose, it elaborates a private communication protocol which is based on the Signal Protocol by the Open Whisper Systems for the end-to-end encryption. The ultimate objective of the elaborated protocol is to provide security coverage for private communication across the digital channels. While the Signal Protocol is considered to be a strong encryption open-source, CT&R will migrate its operating mechanism to the blockchain surface.

Spotlight on digital security

The security concept is without a doubt an important factor, especially in the area of two-party communication. Since a number of ever-increasing messaging applications alongside well-known Apps have become a strong force, secure communication protocols are increasingly demanded for online interactions. The requirements for secure communications are comprehensive as they include confidentiality of exchanged messages, content integrity, etc.

Bearing in mind what is expected from a secure communication protocol, CT&R will propose a decentralized network architecture for private text messaging and voice communication. For this, a number of mechanisms underlying the encryption process will be implemented. First of all, they will guarantee that the information is fully encrypted. Alongside this, particular algorithms will allow to initiate asynchronous communication sessions, that is, messages can be send at any time.

https://www.mycapitalco.in

For these purposes, CT&R has designed the N2N-RTP protocol which regulates operations at each network node and allows for secure data transmission. Moreover, nodes will form the core of the system, as each node will be assigned to a specific task, such as attaching and signing the Proof-of-Origin.

System modes and operating algorithms

1. End-to-end encryption. First and foremost, centralized servers will be replaced with nodes. For this purpose, all parties require cryptographic keys that are used to establish session keys. Keys will be exchanged between parties with forward secrecy.

2. Double ratchet algorithm. Symmetric keys will be implemented to operate messaging chains. As soon as a new ratchet public key is received, chain keys will be replaced.

3. Registration and communication processes. User authentication in the network security is highly important. The system will operate with several types of cryptographic keys, that are user identity keys, signed and on-time prekeys as well as prekey signatures. Similarly, this scope of keys will be implemented to initialize communication sessions.

Token Sale Plan

All transactions will be denominated either in CALL or CALLG tokens. While CALL tokens are solely based on the Proof-of-Work algorithm, CALLG tokens rely both on Proof-of-Work and Proof-of-Stake to reward for node operations. Private Sale has started on July 1, 2018 and will last till July 31, 2018. Public ICO will start on August 30, 2018 and end on September 30, 2018.

Nowadays there are many different systems and programs that ensure security during online sessions. Thus, software companies design secure programs by combining different kinds of methods. Since some of the programs provide an open source license, they offer a free space for developers to build required extensions on their basis. The Signal Protocol is one of the security codes that can be utilized for this purpose. What makes Capital Protocol unique, is that it makes use of cryptographic algorithms within the decentralized framework to bring more security in communication services. In order to achieve this goal, CT&R elaborates a complex system of cryptographic keys and signatures to ensure that each message within its network is computed with a unique key. At the same time, ephemeral keys will serve only one communication session and can't be applied after the session is closed. Further development plans include launching new in-house phones with the per-installed Capital application.

Links:

Website: https://www.mycapitalco.in
WhitePaper: https://bit.ly/2NmdQdY
Telegram: https://t.me/capital_technologies
Facebook: https://www.facebook.com/capital.technologies.research/
Twitter: https://twitter.com/capital_company
Medium: https://medium.com/@mycapitalco.in
ANN: https://bitcointalk.org/index.php?topic=3270130.100
Author: https://bitcointalk.org/index.php?action=profile;u=980049

Disclaimer
This review by Bonanza Kreep is all opinion and analysis, not investment advice.

Sort:  

Well mobile communications over blockchain is a really good idea... It will prove to be much more secure.. I am sure this will work wonders....

Yes, you're right, mobile communication may soon choose the path of independent development on blockchain.

Coin Marketplace

STEEM 0.36
TRX 0.12
JST 0.039
BTC 69965.85
ETH 3540.49
USDT 1.00
SBD 4.71