INTcoin: A Quantum-Resistant Cryptocurrency

Version 1.0 | November 2025

Lead Developer: Maddison Lane

📄 Download PDF

Project Website: https://international-coin.org

Source Code: https://gitlab.com/intcoin/crypto

License: CC BY-SA 4.0 (Creative Commons Attribution-ShareAlike)

Abstract

As quantum computing advances toward practical implementation, the cryptographic foundations of existing cryptocurrencies face unprecedented threats. INTcoin presents a novel cryptocurrency built from the ground up with NIST-standardized post-quantum cryptographic algorithms, ensuring long-term security against both classical and quantum adversaries. This whitepaper describes INTcoin's architecture, consensus mechanism, cryptographic implementation, and economic model designed to secure digital assets in the post-quantum era.

1. Introduction

1.1 The Quantum Threat

Quantum computers leverage quantum mechanical phenomena to perform certain computational tasks exponentially faster than classical computers. Shor's algorithm, when run on a sufficiently powerful quantum computer, can efficiently solve the discrete logarithm problem and factor large integers—breaking the RSA, ECDSA, and EdDSA cryptographic schemes that secure virtually all existing cryptocurrencies.

Current estimates suggest that quantum computers capable of breaking 256-bit elliptic curve cryptography could emerge within the next 10-20 years. This poses an existential threat to the estimated $2+ trillion cryptocurrency market.

1.2 Existing Solutions and Their Limitations

Several approaches have been proposed to address quantum threats:

  1. Upgrade Paths: Retrofitting existing blockchains with quantum-resistant algorithms
    • Challenges: Coordination complexity, backward compatibility, gradual migration risks
  2. Hybrid Approaches: Combining classical and quantum-resistant signatures
    • Challenges: Increased transaction size, complexity, potential attack vectors
  3. Quantum Key Distribution (QKD): Using quantum mechanics for secure key exchange
    • Challenges: Requires specialized hardware, limited to point-to-point communication

1.3 INTcoin's Approach

INTcoin takes a different approach: building a cryptocurrency from the foundation with quantum resistance as a core design principle rather than a retrofit. By leveraging NIST-standardized post-quantum algorithms (FIPS 203, 204, 202), INTcoin provides:

  • Future-proof security: Protection against both current and future quantum attacks
  • Standards compliance: Using algorithms that have undergone rigorous cryptanalysis
  • Performance optimization: Designed specifically for blockchain use cases
  • Clean architecture: No legacy cryptographic debt or migration complexity

2. Cryptographic Foundations

2.1 CRYSTALS-Dilithium5 (ML-DSA-87)

Purpose: Digital signatures for transaction authorization

Specification: NIST FIPS 204 (Module-Lattice-Based Digital Signature Standard)

Security Level: NIST Security Level 5 (equivalent to AES-256)

Parameters:

  • Public key size: 2,592 bytes
  • Signature size: 4,595 bytes
  • Security parameter: 256-bit quantum security

Rationale: CRYSTALS-Dilithium is a lattice-based signature scheme selected by NIST for standardization due to its strong security proofs, efficient implementation, and resistance to known quantum attacks. The Level 5 parameter set provides the highest security margin.

2.2 CRYSTALS-Kyber1024 (ML-KEM-1024)

Purpose: Key encapsulation for secure communications

Specification: NIST FIPS 203 (Module-Lattice-Based Key-Encapsulation Mechanism)

Security Level: NIST Security Level 5

Parameters:

  • Public key size: 1,568 bytes
  • Ciphertext size: 1,568 bytes
  • Shared secret size: 32 bytes

Rationale: CRYSTALS-Kyber provides efficient key exchange for peer-to-peer communications, enabling secure node-to-node messaging and future protocol enhancements.

2.3 SHA3-256

Purpose: Blockchain hashing, address generation, Merkle trees

Specification: NIST FIPS 202 (SHA-3 Standard)

Security Level: 256-bit classical security, 128-bit quantum security (via Grover's algorithm)

Rationale: SHA-3 (Keccak) is quantum-resistant against known attacks. While Grover's algorithm provides quadratic speedup for hash preimage search, the 256-bit output provides sufficient security margin (128-bit quantum security).

2.4 SHA-256 Proof of Work

Purpose: Mining and consensus

Rationale: While SHA-256 is also vulnerable to Grover's algorithm, the proof-of-work system remains secure because:

  1. Grover's algorithm requires 2128 operations to break 256-bit SHA-256
  2. The mining difficulty can be adjusted to maintain security
  3. PoW serves as a rate-limiting mechanism, not cryptographic authentication
  4. Compatibility with existing mining infrastructure (RandomX)

3. System Architecture

3.1 Transaction Structure

Transaction {
    version: uint32
    inputs: TxInput[]
    outputs: TxOutput[]
    lock_time: uint64
}

TxInput {
    previous_output: OutPoint
    script_sig: bytes        // Dilithium5 signature
    sequence: uint32
}

TxOutput {
    value: uint64            // Amount in base units
    script_pubkey: bytes     // Recipient's Dilithium5 public key hash
}

Key Differences from Bitcoin:

  • Signature field contains Dilithium5 signatures (~4.6 KB vs. ~72 bytes for ECDSA)
  • Public key hashes are SHA3-256 instead of SHA-256
  • Script system simplified for quantum-resistant operations

3.2 Address Format

INTcoin uses Bech32 encoding with the prefix int1 for mainnet addresses:

int1q[40-character-base32-encoded-hash]

Example: int1qw508d6qejxtdg4y5r3zarvaryvn6xqc5s8j7fh

Address generation:

  1. Generate Dilithium5 key pair (pk, sk)
  2. Hash public key: h = SHA3-256(pk)
  3. Encode: address = bech32_encode("int1", h)

3.3 Block Structure

BlockHeader {
    version: uint32
    previous_block_hash: Hash256
    merkle_root: Hash256
    timestamp: uint64
    bits: uint32             // Difficulty target
    nonce: uint64            // Proof-of-work nonce
}

Block {
    header: BlockHeader
    transactions: Transaction[]
}

3.4 Merkle Tree

INTcoin uses SHA3-256 for Merkle tree construction:

merkle_root = SHA3-256(
    SHA3-256(tx1_hash || tx2_hash) ||
    SHA3-256(tx3_hash || tx4_hash) ||
    ...
)

This provides quantum-resistant transaction integrity verification.

4. Consensus Mechanism

4.1 Proof of Work

INTcoin uses SHA-256 Proof-of-Work with the following parameters:

  • Algorithm: SHA-256 double hash (compatible with RandomX)
  • Block time: 2 minutes (120 seconds)
  • Difficulty adjustment: Every block (similar to Bitcoin Cash)
  • Initial difficulty: 0x1d00ffff (Bitcoin's genesis difficulty)

4.2 Difficulty Adjustment

To maintain consistent 2-minute block times, difficulty adjusts using an exponential moving average:

new_difficulty = old_difficulty * (target_time / actual_time)

Where:

  • target_time = 120 seconds
  • actual_time = time_of_current_block - time_of_previous_block
  • Adjustment bounded by ±25% per block to prevent manipulation

5. Economic Model

5.1 Supply Parameters

  • Maximum Supply: 221,000,000,000,000 INT (221 Trillion)
  • Initial Block Reward: 105,113,636 INT
  • Block Time: 2 minutes
  • Halving Interval: 1,051,200 blocks (~4 years)
  • Decimal Precision: 8 decimal places (1 INT = 100,000,000 base units)

5.2 Emission Schedule

Block reward follows Bitcoin's halving model:

Era Blocks Years Reward per Block Total Emission
0 0 - 1,051,199 0-4 105,113,636 ~110.5 T
1 1,051,200 - 2,102,399 4-8 52,556,818 ~55.2 T
2 2,102,400 - 3,153,599 8-12 26,278,409 ~27.6 T
3 3,153,600 - 4,204,799 12-16 13,139,204 ~13.8 T

After 64 halvings (~256 years), block rewards become negligible, and miners rely on transaction fees.

5.3 Rationale for Large Supply

The 221 trillion supply is designed for:

  1. Psychological accessibility: Low per-unit price makes the currency approachable
  2. Divisibility: Ample room for micropayments without requiring tiny fractions
  3. Global scale: Sufficient units to serve as a global currency
  4. Inflation hedge: Large initial supply with controlled emission

6. Network Architecture

6.1 Peer-to-Peer Network

INTcoin implements a decentralized P2P network using:

  • Protocol: TCP/IP
  • Default port: 8333 (mainnet), 18333 (testnet)
  • Peer discovery: DNS seeds, hardcoded seed nodes, peer exchange
  • Message format: Binary protocol with version negotiation

6.2 Node Types

  1. Full Nodes: Store complete blockchain, validate all transactions and blocks
  2. Light Nodes (SPV): Store block headers only, suitable for mobile wallets
  3. Mining Nodes: Full node functionality plus block creation via proof-of-work

7. Performance Analysis

7.1 Transaction Throughput

Theoretical Maximum:

  • Block size: 2 MB
  • Block time: 120 seconds
  • Average transaction size: ~5 KB (due to quantum-resistant signatures)
  • Transactions per block: 2,048,000 bytes / 5,120 bytes ≈ 400 tx/block
  • Transactions per second: 400 / 120 ≈ 3.33 TPS

7.2 Validation Performance

Stress testing results (November 2025):

  • Block validation: 86,207 transactions/second
  • UTXO queries: 27.7 million queries/second
  • Mempool throughput: 35,000 transactions/second
  • Hash rate: 2.5 million hashes/second (Apple M-series)

These benchmarks demonstrate INTcoin's production readiness.

8. Security Analysis

8.1 Attack Vectors

8.1.1 Quantum Attacks

Attack Type Target Mitigation
Shor's Algorithm Dilithium5 signatures Lattice-based crypto immune to Shor's
Grover's Algorithm SHA-256 PoW 128-bit quantum security sufficient
Grover's Algorithm SHA3-256 hashes 128-bit quantum security sufficient

8.1.2 Classical Attacks

  • 51% Attack: Requires majority hash power; economically expensive
  • Double Spend: Prevented by PoW confirmation requirements
  • Sybil Attack: Mitigated by PoW and peer scoring
  • Eclipse Attack: Mitigated by diverse seed nodes and peer selection

9. Ecosystem Development

9.1 Wallets

Desktop Wallet (intcoin-qt): Full node with GUI, complete blockchain validation, available for Windows, macOS, Linux, and FreeBSD.

Command Line Interface (intcoin-cli): Full node daemon with RPC interface for automation.

Mobile Wallets (Planned Q2 2026): SPV mode for iOS and Android with QR code scanning.

9.2 Block Explorer

Web-based block explorer at https://explorer.international-coin.org provides transaction lookups, block statistics, and network health metrics.

10. Roadmap

✅ Completed Milestones (Q4 2025)

  • Core blockchain implementation
  • Dilithium5 and Kyber1024 integration
  • Full node and wallet software
  • Performance optimization (86K TPS validation)
  • Genesis block mining
  • Seed node infrastructure (8 global locations)

Q1 2026: Mainnet Launch

  • Official mainnet launch (January 1, 2026)
  • Public wallet releases
  • Block explorer deployment
  • Security audit by third-party firm

Q2 2026: Ecosystem Growth

  • Exchange listings (target: 5+ major exchanges)
  • Mobile wallet releases (iOS, Android)
  • Developer SDK and documentation

Q3-Q4 2026: Advanced Features

  • Lightning Network integration (Layer 2 scaling)
  • Privacy enhancements (confidential transactions)
  • Smart contract platform (quantum-resistant VM)

11. Governance

11.1 Development Model

INTcoin follows an open-source development model:

11.2 Core Development Team

  • Lead Developer: Maddison Lane
  • Community contributors encouraged to participate

11.3 Funding

  • No premine or ICO
  • Fair launch with public mining
  • Development funded by community donations

12. Comparison with Existing Cryptocurrencies

Feature INTcoin Bitcoin Ethereum Monero
Quantum Resistance Yes (Native) No No No
Signature Algorithm Dilithium5 ECDSA ECDSA EdDSA
Hash Algorithm SHA3-256 SHA-256 Keccak-256 Keccak
Block Time 2 min 10 min 12 sec 2 min
Max Supply 221 T 21 M Unlimited Unlimited

14. Conclusion

The advent of practical quantum computing poses an existential threat to current cryptocurrency infrastructure. INTcoin addresses this challenge by providing a quantum-resistant cryptocurrency built on NIST-standardized post-quantum cryptographic algorithms.

By combining Dilithium5 signatures, Kyber1024 key exchange, and SHA3-256 hashing with a proven proof-of-work consensus mechanism, INTcoin delivers:

  1. Future-proof security against quantum and classical attacks
  2. Standards compliance with NIST FIPS 203, 204, and 202
  3. High performance validated at 86,000 TPS
  4. Fair economics with transparent emission schedule
  5. Open development under the MIT License

The genesis block has been mined. The network launches January 1, 2026.

The future is quantum-resistant.

15. References

  1. National Institute of Standards and Technology (NIST). "Post-Quantum Cryptography Standardization." https://csrc.nist.gov/projects/post-quantum-cryptography
  2. Ducas, L., et al. "CRYSTALS-Dilithium: Algorithm Specifications and Supporting Documentation." NIST PQC Submission, 2021.
  3. Bos, J., et al. "CRYSTALS-Kyber: Algorithm Specifications and Supporting Documentation." NIST PQC Submission, 2021.
  4. Shor, P. W. "Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer." SIAM Journal on Computing, 1997.
  5. Grover, L. K. "A Fast Quantum Mechanical Algorithm for Database Search." Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, 1996.
  6. Nakamoto, S. "Bitcoin: A Peer-to-Peer Electronic Cash System." 2008.
  7. Buterin, V. "Ethereum Whitepaper." 2014.
  8. Bernstein, D. J., et al. "Post-Quantum Cryptography." Springer, 2009.

Document Version: 1.0 | Last Updated: November 13, 2025

📄 Download PDF Version