SORA Whitepaper
>> Click here

Welcome to SORA Project

Thank you very much for your continued support of SORA since 2018. On this website, SORA SorachanCoin L1 cryptographic keys and mining Quantum-resistance, we continue our research into cryptographic keys with quantum resistance. Due to the fact that quantum-related issues affect both ECDSA and Proof of Work (PoW), resolving them is expected to take considerable time.

As such, we are shifting our focus toward SORA L2 Blockchain FromHDDtoSSD, which utilizes 2048-bit quantum-resistant keys and allows for greater flexibility in operation. SORA L2 features decentralized HDD/SSD/NVMe drive inspection, data recovery functionality, and AI-NFT support. By leveraging AI-NFT, we enable decentralized AI processing on the blockchain, delivered as Windows-based software. Naturally, SORA L2 operates as a full node as well.

Let’s get started simply download and run the program. It supports Windows 11, 10, 8.1, 8, and 7.
Download:SORA L2 Blockchain FromHDDtoSSD

With the rapid advancement of quantum computers in recent years, it has become increasingly necessary to perform exhaustive verification of ECDSA and candidate keys for quantum resistance. This page will gradually summarize the structural patterns and critical insights we have identified through this process.

To begin with, we decided to examine how randomly obtained data - corresponding to private keys - is mapped into key structures, from a classical perspective.

Comparative Study of Public Key Hash Structures and Quantum Resistance

Analyzing Address Mapping Structures Derived from ECDSA Public Keys: Structural Deviations and Evaluation under Hypothetical Quantum Scenarios

Abstract

This paper presents a comparative analysis of various address structures derived from ECDSA public keys, evaluated in the context of emerging quantum computing capabilities. We focus on widely used cryptographic hash functions-SHA-256, RIPEMD-160, Keccak-256, Blake2s, and Blake3 and examine their structural properties, potential output biases, and theoretical resilience to quantum-based computational models.

Rather than framing these as targets of attack, our approach simulates future scenarios where quantum computers could realistically analyze or probe the structural weaknesses in current blockchain address schemes. The goal is to proactively identify formats that may be structurally susceptible and to provide a foundation for migration toward more quantum-resilient standards.

Mapping Methods Analyzed

No. ECDSA Mapping Method Address Size Notes
(1) Raw Public Key 256 - 264 bits Direct usage of public key
(2) Public Key → SHA256 256 bits Intermediate format
(3) Public Key → SHA256 → RIPEMD160 160 bits Bitcoin P2PKH standard
(4) Public Key → Keccak256 → Bottom 20 bytes 160 bits Ethereum address format
(5) Public Key → Keccak256 → Top 20 bytes 160 bits Used for distribution and deviation analysis
(6) Public Key → SHA256 → Blake2s 256 bits Modern construction
(7) Public Key → SHA256 → Blake3 256 bits Modern construction
(8) Public Key → Blake3 256 bits Highly parallel, structurally minimal
(9) Public Key → SHA256 → SHA1 160 bits Reference only

Evaluation of Structural Bias and Quantum Resistance

No. ECDSA Mapping Method Bias Level Crypto Strength Scenario for Quantum Evaluation
(1) Raw Public Key Low Medium-High Target of Shor’s algorithm
RSA 2048 bits - 1,000,000 qbits (by Google)
(2) SHA256 Only Medium-Low Medium-High Exploration using Grover’s algorithm
O(2^113) - O(2^128)
(3) SHA256 → RIPEMD160 Medium Medium Exploration using Grover’s algorithm
O(2^67) - O(2^80)
(4) Keccak256
Bottom 20 Bytes
Medium-High Medium-Low Exploration using Grover’s algorithm
O(2^60) - O(2^80)
(5) Keccak256
Top 20 Bytes
Medium Medium Exploration using Grover’s algorithm
O(2^67) - O(2^80)
(6) SHA256 → Blake2s Medium-Low Medium-High Exploration using Grover’s algorithm
O(2^113) - O(2^128)
(7) SHA256 → Blake3 Medium-Low High Exploration using Grover’s algorithm
O(2^113) - O(2^128)
(8) Blake3 Only Low Medium-High Exploration using Grover’s algorithm
O(2^113) - O(2^128)
(9) SHA256 → SHA1 High Broken Exploration using Classical method
O(2^61) - O(2^65)

Discussion

The combination of SHA-256 and RIPEMD-160 as used in Bitcoin is structurally compact but limited to 160-bit outputs, making it increasingly susceptible to exhaustive structural probing as quantum capabilities advance.

In Ethereum-style Keccak-256 truncation (bottom 20 bytes), incomplete avalanche behavior results in observable biases. These may lead to statistically non-uniform address clusters, particularly vulnerable in scenarios where global quantum evaluation is possible.

Blake3 appears most promising as a quantum-resilient hashing solution due to its parallelism and lack of deterministic structure. It provides a strong foundation for next-generation blockchain addressing.

Strategic Outlook

Based on the results of this comparative study, the SORA Project is gradually transitioning to address formats with reduced bias and higher quantum resilience. Specifically, the use of full-length SHA-256 or Blake3 outputs-combined with RSA2048 hybrid structures-offers a means of avoiding high-risk compression steps and increasing resistance to future cryptanalytic advances.

The update is actively underway with full commitment.

On Quantum Computers and Probability Amplitudes

In the example above, we were able to significantly increase the probability amplitude for maintaining the frequency domain. However, such cases are rare, and quantum computers are weak at tasks like finding the preimage of a hash designed to lack periodicity. This is because, without periodicity, there is no effective method to significantly increase the probability amplitude of the value to be observed.

While there are methods to gradually increase the probability amplitude, they only scale by approximately the square root and are therefore impractical. Consequently, by incorporating mathematical elements that make it difficult to enhance probability amplitudes into the signatures of public-key cryptographic systems, it is possible to achieve quantum resistance for blockchain systems.

The following image represents the quantum resistance integrated into SORA L1. It incorporates signatures that utilize this property.

Balances separated between ECDSA and Quantum resistance

The SORA Quantum-Resistant Blockchain automatically separates the balances of the widely adopted ECDSA cryptography, used in Bitcoin and similar systems, and the quantum-resistant cryptography uniquely enhanced and implemented by SORA. Users can utilize both ECDSA and quantum-resistant cryptography without being aware of the differences. Specialized knowledge, such as multisig, is "not required." Simply using the blockchain as usual allows you to enjoy the benefits of quantum resistance.

AI-NFT

Support for ownership management, metaverse, drive(HDD/SSD/NVMe) inspection and advanced scientific analysis ... etc.

Web3 - Blockchain - Multidimensional NFT by SORA Network. We aim to popularize multidimensional NFTs that can be built by direct product based on Web3 - blockchain technology. The base development has already been completed, and 1-dim NFT, 2-dim NFT, and 4-dim NFT are operating normally on SORA Network.

SORA L1 Quantum Resistance in Blockchain Core

We have implemented quantum resistance directly on L1, eliminating the need for a bridge.

The traditional public-key cryptography method, ECDSA, widely used in Bitcoin and other systems, uses addresses that start with "S." In contrast, quantum-resistant transactions incorporating SORA's proprietary quantum-resistant signature use addresses that start with "sora1."

The implementation is remarkably simple!

SORA L2 Quantum Resistance in Blockchain AI-NFT

On SORA L2, we are developing blockchain-based applications. Please feel free to make use of them as well. In the following image, blockchain is integrated with other functionalities, operating inspection features and more with AI in the background.

About the Specifications

Maximum issuance amount 8,000,000
Current circulating supply https://us.junkhdd.com:7350/ext/getmoneysupply
Block explorer https://us.junkhdd.com:7350/
Block generation time 3 minutes
Hashing algorithm Scrypt
Consensus PoW + PoS Hybrid
PoW reward 1 SORA / block
PoS reward 3% / year
CoinMarketCap https://coinmarketcap.com/currencies/sorachancoin/
CoinCodex https://coincodex.com/crypto/sorachancoin/
CoinGecko https://www.coingecko.com/en/coins/sorachancoin
CryptoSky https://www.cryptoskyplatform.xyz