Secure

Security is one of the most important aspects of any cryptocurrency. AMMO relies on Quark hashing as its algorithm. Quark is a one level hash function and does not require a large amount of RAM. It uses a 64-bit protection against attacks by hackers and it known for its low power consumption.

Quark on the International Association for Cryptologic Research website iacr.org (.pdf)

Nine Levels of Encryption

AMMO uses six different cryptographic algorithms to make nine levels of encryption. The six algorithms are Grøstl, Blue Midnight Wish, Keccak, JH, Skein and Blake.

Grøstl

Hashing algorithm submitted to the National Institute of Standards and Technology (NIST) hash function competition back in 2012. It was in the one five finalists, along with Keccak, Skein, JH and Blake.

01

Blue Midnight Wish (BMW)

Submitted in 2012 to the SHA-3 National Institute of Standards and Technology (NIST) hash competition. It was created by Danilo Gligoroski, Vlastimil Klima, Svein Johan Knapskog, Mohamed El-Hadedy, Jørn Amundsen and Stig Frode Mjølsnes. It is resistant to length-extension and multi-collision hacker attacks. It was designed to be much more efficient than SHA-2 cryptographic hash functions, as well as offering the same or better security.

02

Keccak

Created by Guido Bertoni, Joan Daemen, Michael Peeters, and Gilles Van Assche, Keccak was a finalist in a cryptographic hash algorithm competition held on 2nd November 2007. The competition was run by National Institute of Standards and Technology (NIST) and ended on 2nd October 2012, when the winning algorithm was announced. This winning algorithm was Keccak and was the become the new standardized SHA-3. It is based on the cryptographic sponge principle, which it what makes it so effective.

03

JH

JH is a hashing algorithm created by Hongjun Wu. It was submitted to the National Institute of Standards and Technology (NIST) hash function competition in 2012 and was one of the five finalists, along with Keccak, Skein, Grøstl and Blake. The ultimate winner of the competition was Keccak. There are four JH hash algorithms; JH-224, JH-256, JH-384 and JH-512.

04

Skein

Derived from threefish, the Skein algorithm is a cryptographic hash function that came in the top five of a National Institute of Standards and Technology (NIST) hash function competition. The Skein function intertwines the input, hence the name, which comes from a skein of yarn, where yarn is wrapped in a loose twist. It was created by Bruce Schneier, Niels Ferguson, Stefan Lucks, Doug Whiting, Mihir Bellare, Tadayoshi Kohno, Jon Callas and Jesse Walker.

05

Blake

This hashing algorithm was entered in the SHA-3 National Institute of Standards and Technology (NIST) cryptographic algorithm competition, back at the start of 2012. It was one of the five finalists that would replace the SHA-3 hashing algorithm standard. It was created by Danilo Gligoroski, Vlastimil Klima, Svein Johan Knapskog, Mohamed El-Hadedy, Jørn Amundsen and Stig Frode Mjølsnes and is resistant to length-extension and multi-collision hacker attacks.

06