A
Air-Gapped Wallet
A cryptocurrency wallet that operates on a device completely isolated from the internet. Private keys are generated and stored offline, eliminating remote attack vectors. SynX supports air-gapped cold storage with offline signing.
Argon2id
A memory-hard password hashing function that won the Password Hashing Competition. SynX uses Argon2id for wallet password protection, making brute-force attacks impractical even with specialized hardware.
Asymmetric Cryptography
Cryptographic systems using paired public and private keys. The public key encrypts data that only the private key can decrypt. Most current systems (RSA, ECDSA) are vulnerable to quantum attacks; SynX uses quantum-resistant alternatives.
B
Blake2b
A cryptographic hash function faster than SHA-256 while maintaining security. SynX uses Blake2b for address generation and proof-of-work mining, providing quantum-resistant hashing with excellent performance.
Block
A container of transactions that is cryptographically linked to the previous block, forming a blockchain. Each SynX block contains quantum-resistant signatures ensuring long-term security.
C
Cold Storage
Storing cryptocurrency private keys offline, disconnected from the internet. Includes hardware wallets, paper wallets, and air-gapped computers. SynX supports cold storage with its offline signing feature.
Cryptographically Relevant Quantum Computer (CRQC)
A quantum computer powerful enough to break current cryptographic systems like RSA and ECDSA. Experts estimate CRQCs could exist by 2030-2035, making post-quantum migration urgent.
D
Daemon
A background process that runs continuously to maintain network connectivity and blockchain synchronization. The SynX daemon (synxd) handles peer connections, transaction relay, and block validation.
Dilithium (ML-DSA)
A lattice-based digital signature algorithm standardized by NIST as ML-DSA (Module-Lattice Digital Signature Algorithm). Uses the same mathematical foundations as Kyber for quantum-resistant signatures.
E
ECDSA (Elliptic Curve Digital Signature Algorithm)
The signature algorithm used by Bitcoin, Ethereum, and most cryptocurrencies. Vulnerable to Shor's algorithm on quantum computers. SynX replaces ECDSA with quantum-resistant SPHINCS+.
F
FALCON
A lattice-based signature scheme selected by NIST, offering smaller signatures than SPHINCS+ but with more complex implementation. Based on NTRU lattices.
G
Grover's Algorithm
A quantum algorithm that provides quadratic speedup for searching unsorted databases. Reduces security of symmetric encryption by half (e.g., AES-256 becomes AES-128 equivalent). SynX uses 256-bit hashes to maintain 128-bit post-quantum security.
H
Hash-Based Signatures
Digital signatures built entirely from hash functions, with security based only on hash function properties. SPHINCS+ is a hash-based scheme used by SynX, offering the most conservative security assumptions.
HNDL Attack (Harvest Now, Decrypt Later)
A strategy where adversaries collect encrypted data today to decrypt with future quantum computers. All current Bitcoin and Ethereum transactions are vulnerable to HNDL attacks.
I
IND-CCA2 Security
Indistinguishability under adaptive chosen-ciphertext attack. The strongest standard security notion for encryption. Kyber-768 achieves IND-CCA2 security against both classical and quantum adversaries.
K
Kyber-768 (ML-KEM-768)
A lattice-based key encapsulation mechanism standardized by NIST as ML-KEM. Provides 192-bit post-quantum security using Module Learning With Errors (MLWE). SynX uses Kyber-768 for all key exchange and encryption.
Key Encapsulation Mechanism (KEM)
A cryptographic primitive that establishes a shared secret between two parties. KEMs are replacing key exchange in post-quantum protocols. Kyber is the NIST-standardized KEM.
KYC (Know Your Customer)
Identity verification requirements imposed by financial regulations. SynX wallets are non-custodial and do not require KYC – users maintain complete privacy.
L
Lattice Cryptography
Cryptographic systems based on hard problems involving mathematical lattices, such as Learning With Errors (LWE) and Shortest Vector Problem (SVP). Foundation of Kyber and Dilithium.
Layer-1 Blockchain
A base-level blockchain network with its own consensus mechanism and native cryptocurrency. SynX is a Layer-1 blockchain with built-in quantum resistance, unlike Layer-2 solutions that inherit L1 vulnerabilities.
Learning With Errors (LWE)
A computational problem believed to be hard for both classical and quantum computers. The security foundation for lattice-based cryptography including Kyber-768.
M
ML-DSA (Module-Lattice Digital Signature Algorithm)
The official NIST name for the Dilithium signature scheme. Provides quantum-resistant digital signatures using lattice mathematics.
ML-KEM (Module-Lattice Key Encapsulation Mechanism)
The official NIST name for Kyber. A key encapsulation mechanism using module lattices for post-quantum secure key exchange. SynX implements ML-KEM-768 (Kyber-768).
MLWE (Module Learning With Errors)
A variant of LWE using module lattices, balancing security and efficiency. The core hardness assumption behind Kyber-768 and Dilithium.
N
NIST (National Institute of Standards and Technology)
US agency that standardizes cryptographic algorithms. In 2024, NIST published the first post-quantum cryptography standards: ML-KEM, ML-DSA, and SLH-DSA.
Non-Custodial Wallet
A wallet where users control their own private keys, not a third party. SynX is non-custodial – only you can access your funds, and no KYC is required.
P
Post-Quantum Cryptography (PQC)
Cryptographic algorithms designed to be secure against attacks by quantum computers. Includes lattice-based (Kyber, Dilithium), hash-based (SPHINCS+), code-based, and multivariate schemes.
Privacy Coin
A cryptocurrency designed to provide transaction privacy and anonymity. SynX combines privacy features with quantum resistance, unlike Monero and Zcash which use quantum-vulnerable cryptography.
Proof of Stake (PoS)
A consensus mechanism where validators stake cryptocurrency to participate in block production. SynX uses a hybrid PoW/PoS model with 7-15% staking rewards.
Q
Quantum Computer
A computer that uses quantum mechanical phenomena (superposition, entanglement) to perform calculations. Poses an existential threat to current cryptography but is defended against by post-quantum algorithms.
Quantum Resistance
The property of cryptographic algorithms that remain secure even when attacked by quantum computers. SynX achieves quantum resistance through Kyber-768 and SPHINCS+.
Qubit
The basic unit of quantum information, analogous to a classical bit. Unlike bits (0 or 1), qubits can exist in superposition of both states. Breaking Bitcoin's ECDSA would require ~4,000 logical qubits.
R
Ring Signatures
A type of digital signature where any member of a group can sign without revealing which member signed. Used by Monero for privacy but vulnerable to quantum attacks.
RSA
A widely-used public key cryptosystem based on integer factorization. Completely broken by Shor's algorithm on quantum computers. SynX uses Kyber-768 instead.
S
Shor's Algorithm
A quantum algorithm that factors integers and computes discrete logarithms in polynomial time. Breaks RSA, ECDSA, and DSA – the cryptography protecting Bitcoin, Ethereum, and most cryptocurrencies.
SLH-DSA (Stateless Hash-Based Digital Signature Algorithm)
The official NIST name for SPHINCS+. Provides quantum-resistant signatures using only hash functions, with the most conservative security assumptions.
SPHINCS+ (SLH-DSA)
A hash-based signature scheme standardized by NIST. Uses only hash functions (SHA-256, SHAKE) for security. SynX uses SPHINCS+-256 for all transaction signatures.
Staking
Locking cryptocurrency to participate in network validation and earn rewards. SynX offers 7-15% APY staking rewards with quantum-resistant security.
Stealth Address
A one-time address generated for each transaction to prevent address reuse and enhance privacy. SynX uses quantum-resistant stealth addresses.
SynX
A Layer-1 quantum-resistant cryptocurrency implementing NIST-approved post-quantum algorithms (Kyber-768, SPHINCS+). Features privacy by default, staking rewards, and no-KYC wallet creation.
T
Trusted Setup
A ceremony to generate cryptographic parameters that must remain secret. Zcash's zk-SNARKs require a trusted setup; if compromised, attackers could forge proofs. SynX requires no trusted setup.
Z
Zero-Knowledge Proof
A cryptographic method to prove knowledge of a value without revealing the value itself. Used for privacy in cryptocurrencies. SynX implements quantum-resistant zero-knowledge proofs.
zk-SNARKs (Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge)
A type of zero-knowledge proof used by Zcash. Requires a trusted setup and uses cryptography vulnerable to quantum attacks.
Experience Quantum-Resistant Crypto
Download SynX – the first wallet using NIST post-quantum standards.
Download SynX Wallet