Aside from implementing the latest cryptographic schemes, we’ve also created a network that enables us to quickly implement such schemes when needed. This flexibility will allow our network to easily stay ahead of any new quantum computing developments. Moreover, while nearly all cryptocurrencies rely on a wallet that holds one type of key (all of which are used in the same encryption scheme), the XTRABYTES™ network will employ accounts that can hold a variety of encryption keys. By doing so, we’re able to allow each application/service to select which encryption scheme they would like to use. Encryption schemes with asymmetric keys, which could serve as a replacement for RSA or ECC key pairs, and which are considered quantum-resistant, already exist. However, these schemes (among them the Lamport Signature scheme, Ring Learning With Errors Signature scheme, and the Rainbow Signature scheme) retain some limitations and/or require more testing. Nonetheless, our team is keeping a close eye on their development, as our network will want to readily accept them once they have been thoroughly tested. Amazingly, other blockchains rely on only one encryption scheme to protect their entire network. This inevitably exposes the network if the relied-upon encryption scheme is compromised In contrast, the XTRABYTES™ network will employ a variety of encryption schemes for our various network components. By ensuring that our network retains diverse and flexible security, we aim to ensure its superiority over networks with singular encryption schemes. And by preventing one encryption scheme from becoming a single point of failure, this approach improves the decentralized nature of our network. When it comes to encryption schemes with symmetric keys, our XCITE™ client currently incorporates AES-256 to encrypt all account data. This encryption scheme is still considered quantum-resistant despite recent advances in quantum computing. We selected this particular encryption scheme for XCITE™ as it is still regarded as one of the top encryption schemes that use symmetric keys. Not incidentally, it’s frequently employed worldwide by private companies and public entities alike. In June 2003, the U.S. Government announced that AES could be used to protect classified information: “The design and strength of all key lengths of the AES algorithm (i.e., 128, 192 and 256) are sufficient to protect classified information up to the SECRET level. TOP SECRET information will require the use of either the 192 or 256 key lengths. ” The U.S. Government still uses the AES encryption scheme today Nonetheless, we do not consider ourselves bound to any one particular encryption scheme. And should the need arise, we have the capacity to upgrade to a new and even more secure encryption scheme. Individuals seeking to learn more about the encryption schemes employed by our network will be able to do so by taking courses at "); background-size: 1px 1px; background-position: 0px calc(1em + 1px);">The XTRABYTES Academy.