Welcome to SORA Project
Thank you very much for your continued support of SORA since 2018. On this website, SORA SorachanCoin L1 cryptographic keys and mining Quantum-resistance, we continue our research into cryptographic keys with quantum resistance. Due to the fact that quantum-related issues affect both ECDSA and Proof of Work (PoW), resolving them is expected to take considerable time.
As such, we are shifting our focus toward SORA L2 Blockchain FromHDDtoSSD, which utilizes 2048-bit quantum-resistant keys and allows for greater flexibility in operation. SORA L2 features decentralized HDD/SSD/NVMe drive inspection, data recovery functionality, and AI-NFT support. By leveraging AI-NFT, we enable decentralized AI processing on the blockchain, delivered as Windows-based software. Naturally, SORA L2 operates as a full node as well.
Let’s get started simply download and run the program. It supports Windows 11, 10, 8.1, 8, and 7.
Download:SORA L2 Blockchain FromHDDtoSSD

With the rapid advancement of quantum computers in recent years, it has become increasingly necessary to perform exhaustive verification of ECDSA and candidate keys for quantum resistance. This page will gradually summarize the structural patterns and critical insights we have identified through this process.
To begin with, we decided to examine how randomly obtained data - corresponding to private keys - is mapped into key structures, from a classical perspective.
Comparative Study of Public Key Hash Structures and Quantum Resistance
Analyzing Address Mapping Structures Derived from ECDSA Public Keys: Structural Deviations and Evaluation under Hypothetical Quantum Scenarios
Abstract
This paper presents a comparative analysis of various address structures derived from ECDSA public keys, evaluated in the context of emerging quantum computing capabilities. We focus on widely used cryptographic hash functions-SHA-256, RIPEMD-160, Keccak-256, Blake2s, and Blake3 and examine their structural properties, potential output biases, and theoretical resilience to quantum-based computational models.
Rather than framing these as targets of attack, our approach simulates future scenarios where quantum computers could realistically analyze or probe the structural weaknesses in current blockchain address schemes. The goal is to proactively identify formats that may be structurally susceptible and to provide a foundation for migration toward more quantum-resilient standards.
Mapping Methods Analyzed
No. | ECDSA Mapping Method | Address Size | Notes |
---|---|---|---|
(1) | Raw Public Key | 256 - 264 bits | Direct usage of public key |
(2) | Public Key → SHA256 | 256 bits | Intermediate format |
(3) | Public Key → SHA256 → RIPEMD160 | 160 bits | Bitcoin P2PKH standard |
(4) | Public Key → Keccak256 → Bottom 20 bytes | 160 bits | Ethereum address format |
(5) | Public Key → Keccak256 → Top 20 bytes | 160 bits | Used for distribution and deviation analysis |
(6) | Public Key → SHA256 → Blake2s | 256 bits | Modern construction |
(7) | Public Key → SHA256 → Blake3 | 256 bits | Modern construction |
(8) | Public Key → Blake3 | 256 bits | Highly parallel, structurally minimal |
(9) | Public Key → SHA256 → SHA1 | 160 bits | Reference only |
Evaluation of Structural Bias and Quantum Resistance
No. | ECDSA Mapping Method | Bias Level | Crypto Strength | Scenario for Quantum Evaluation |
---|---|---|---|---|
(1) | Raw Public Key | Low | Medium-High | Target of Shor’s algorithm RSA 2048 bits - 1,000,000 qbits (by Google) |
(2) | SHA256 Only | Medium-Low | Medium-High | Exploration using Grover’s algorithm O(2^113) - O(2^128) |
(3) | SHA256 → RIPEMD160 | Medium | Medium | Exploration using Grover’s algorithm O(2^67) - O(2^80) |
(4) | Keccak256 Bottom 20 Bytes |
Medium-High | Medium-Low | Exploration using Grover’s algorithm O(2^60) - O(2^80) |
(5) | Keccak256 Top 20 Bytes |
Medium | Medium | Exploration using Grover’s algorithm O(2^67) - O(2^80) |
(6) | SHA256 → Blake2s | Medium-Low | Medium-High | Exploration using Grover’s algorithm O(2^113) - O(2^128) |
(7) | SHA256 → Blake3 | Medium-Low | High | Exploration using Grover’s algorithm O(2^113) - O(2^128) |
(8) | Blake3 Only | Low | Medium-High | Exploration using Grover’s algorithm O(2^113) - O(2^128) |
(9) | SHA256 → SHA1 | High | Broken | Exploration using Classical method O(2^61) - O(2^65) |
Discussion
The combination of SHA-256 and RIPEMD-160 as used in Bitcoin is structurally compact but limited to 160-bit outputs, making it increasingly susceptible to exhaustive structural probing as quantum capabilities advance.
In Ethereum-style Keccak-256 truncation (bottom 20 bytes), incomplete avalanche behavior results in observable biases. These may lead to statistically non-uniform address clusters, particularly vulnerable in scenarios where global quantum evaluation is possible.
Blake3 appears most promising as a quantum-resilient hashing solution due to its parallelism and lack of deterministic structure. It provides a strong foundation for next-generation blockchain addressing.
Strategic Outlook
Based on the results of this comparative study, the SORA Project is gradually transitioning to address formats with reduced bias and higher quantum resilience. Specifically, the use of full-length SHA-256 or Blake3 outputs-combined with RSA2048 hybrid structures-offers a means of avoiding high-risk compression steps and increasing resistance to future cryptanalytic advances.
The update is actively underway with full commitment.
On Quantum Computers and Probability Amplitudes
In the example above, we were able to significantly increase the probability amplitude for maintaining the frequency domain. However, such cases are rare, and quantum computers are weak at tasks like finding the preimage of a hash designed to lack periodicity. This is because, without periodicity, there is no effective method to significantly increase the probability amplitude of the value to be observed.
While there are methods to gradually increase the probability amplitude, they only scale by approximately the square root and are therefore impractical. Consequently, by incorporating mathematical elements that make it difficult to enhance probability amplitudes into the signatures of public-key cryptographic systems, it is possible to achieve quantum resistance for blockchain systems.
The following image represents the quantum resistance integrated into SORA L1. It incorporates signatures that utilize this property.

Balances separated between ECDSA and Quantum resistance
The SORA Quantum-Resistant Blockchain automatically separates the balances of the widely adopted ECDSA cryptography, used in Bitcoin and similar systems, and the quantum-resistant cryptography uniquely enhanced and implemented by SORA. Users can utilize both ECDSA and quantum-resistant cryptography without being aware of the differences. Specialized knowledge, such as multisig, is "not required." Simply using the blockchain as usual allows you to enjoy the benefits of quantum resistance.

AI-NFT
Support for ownership management, metaverse, drive(HDD/SSD/NVMe) inspection and advanced scientific analysis ... etc.
Web3 - Blockchain - Multidimensional NFT by SORA Network. We aim to popularize multidimensional NFTs that can be built by direct product based on Web3 - blockchain technology. The base development has already been completed, and 1-dim NFT, 2-dim NFT, and 4-dim NFT are operating normally on SORA Network.

SORA L1 Quantum Resistance in Blockchain Core

We have implemented quantum resistance directly on L1, eliminating the need for a bridge.
The traditional public-key cryptography method, ECDSA, widely used in Bitcoin and other systems, uses addresses that start with "S." In contrast, quantum-resistant transactions incorporating SORA's proprietary quantum-resistant signature use addresses that start with "sora1."
The implementation is remarkably simple!

SORA L2 Quantum Resistance in Blockchain AI-NFT
On SORA L2, we are developing blockchain-based applications. Please feel free to make use of them as well. In the following image, blockchain is integrated with other functionalities, operating inspection features and more with AI in the background.

About the Specifications

Maximum issuance amount | 8,000,000 |
Current circulating supply | https://us.junkhdd.com:7350/ext/getmoneysupply |
Block explorer | https://us.junkhdd.com:7350/ |
Block generation time | 3 minutes |
Hashing algorithm | Scrypt |
Consensus | PoW + PoS Hybrid |
PoW reward | 1 SORA / block |
PoS reward | 3% / year |
CoinMarketCap | https://coinmarketcap.com/currencies/sorachancoin/ |
CoinCodex | https://coincodex.com/crypto/sorachancoin/ |
CoinGecko | https://www.coingecko.com/en/coins/sorachancoin |
CryptoSky | https://www.cryptoskyplatform.xyz |