Encryption Of Things (EOT) Whitepaper
The EOT cryptocurrency uses the Blockchain as a ledger of transactions distributed over a P2P network and is decentralized. A consensus is agreed where network participants all agree on the validity of transaction before it is recorded and is termed mining. With cryptography, the Scrypt algorithm is used requiring computer power to process equations proving legitimacy. EOT is developed for the “Encryption of Things” of the “Internet of Things” (IoT) through a process whereby physical items, which are linked to the Internet, are being safeguarded against intrusion by the use of cryptography.
Bitcoin is a virtual currency independent of any entity. It is a peer-to-peer network supported by its users via their computing power. It was designed in 2008 by Satoshi Nakamoto (alias) and released publically as open-source software in 2009. It has gained popularity as an online method for payments and may be used for anonymous transactions. By using the peer-to-peer (P2P) network, issues with double spending are resolved. 
EOT is based upon the principles that Satoshi Nakamoto has implemented in the original code for Bitcoin:
- Transparency (transactions are public)
A blockchain is a distributed database that is used to maintain a continuously growing list of records, called blocks. Each block contains a timestamp and a link to a previous block  and is typically managed by a peer-to-peer network collectively adhering to a protocol for validating new blocks. The protocol EOT uses is the Scrypt algorithm and is discussed further on in this whitepaper.
By design, blockchains are inherently resistant to modification of the data. Once recorded, the data in any given block cannot be altered retroactively without the alteration of all subsequent blocks and the collusion of the network.  This proves very useful with transparency with the inability to alter records.
Blockchain technology is the principle behind the cryptocurrency EOT. Intermediately the EOT coin doesn’t function as a cryptocurrency but uses the cryptography aspect to encrypt and authenticate data. This is a very important point to understand as firstly it has monetary value based on supply and demand, and secondly, cryptography provides validation giving it value.
It must be realized that EOT has a two-fold process:
- Cryptography to encrypt and validate data
- Cryptography as a cryptocurrency (monetary)
The EOT cryptocurrency uses the Blockchain as a ledger of transactions distributed over a P2P network and is decentralized. A consensus is agreed where network participants agree on the validity of transaction before it is recorded and is referred to as “mining”. Cryptography is used (Scrypt algorithm) and equations are solved using computer power as a “proof of work” and are then made available on the Blockchain for transparency.
In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it. Encryption does not of itself prevent interference but denies the intelligible content to a would-be interceptor.
In an encryption scheme, the intended information or message, referred to as plaintext, is encrypted using an encryption algorithm, and for EOT a Scrypt algorithm generating a ciphertext that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key (salt) generated by an algorithm.
In principle, it is possible to decrypt the message without possessing the key, but for a well-designed encryption scheme, considerable computational resources and skills are required and this is why the Scrypt was selected. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized users.
In our modern world encryption has become powerful to ensure privacy and security of communication. Cryptography using blockchain technology is one of the most exciting developments of modern times.
Please refer to Scrypt Technical Specifications of this whitepaper for a technical discussion on this topic.
What is EOT?
EOT coin has been designed for the use in IoT products to secure and authenticate data. By using the blockchain a transparency has been obtained and keeping to Satoshi’s principles. Using the Scrypt algorithm, EOT uses password-key derivatives to push the costs of brute-force attacks beyond reach.
Specifically, EOT is used for password storage and for encryption keys. Malware, poor key exchanges, and untrusted networks can compromise this adding to the importance of why Scrypt was created in the first place – by keeping your encryption keys safe .
EOT Coin Specifics
Encryption Of Things
A total of 50% is pre-mined equalling 100,000,000 EOT tokens and is available on the Waves Platform as a waves-asset and is referred to as the EOT token. More information regarding this decision is covered later in this whitepaper.
EOT Token specifics 
Encryption Of Things Token
EOT is a cryptocurrency and an encryption process. Transactions take place between users directly without the interference of any third party and are done through a P2P network. These transactions are recorded and verified in a public ledger every 90 seconds and this time duration has no bearing on how often data is encrypted, only recorded within the Blockchain.
As EOT is decentralized, it does not belong to any person, business or country and is open source. It is also deflationary due to capped volume, and no more than 200,000,000 EOT will be created.
It is specifically developed for use in the “Encryption of Things” (IoT) through the process whereby physical items, which are linked to the Internet, are being safeguarded against intrusion by the use of cryptography.
The Internet of Things (IoT) is the inter-networking of physical devices, vehicles (also referred to as “connected devices” and “smart devices“), buildings, and other items embedded with electronics, software, sensors, actuators, and network connectivity which enable these objects to collect and exchange data.
In 2013 the Global Standards Initiative on Internet of Things (IoT-GSI) defined the IoT as “a global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) things based on existing and evolving interoperable information and communication technologies” and for these purposes a “thing” is “an object of the physical world (physical things) or the information world (virtual things), which is capable of being identified and integrated into communication networks”.
The IoT allows objects to be sensed or controlled remotely across existing network infrastructure, creating opportunities for more direct integration of the physical world into computer-based systems, and resulting in improved efficiency, accuracy and economic benefit in addition to reduced human intervention.
When IoT is augmented with sensors and actuators, the technology becomes an instance of the more general class of cyber-physical systems, which also encompasses technologies such as smart grids, virtual power plants, smart homes, intelligent transportation and smart cities. Each thing is uniquely identifiable through its embedded computing system but is able to interoperate within the existing Internet infrastructure. Experts estimate that the IoT will consist of about 30 billion objects by 2020 .
In recent times more and more of these devices have become prone to hacking and in need of security solutions thus the need for encryption, this is where EOT may be used.
The first Exchange EOT was available on was the Waves Platform. It was not an ICO but a way to distribute EOT for future businesses/ organizations and other speculating investors to purchase, and this is why there are 100 million tokens available on this platform.
Airdrops were arranged for EOT to be distributed on this platform as the team feels this was the easiest method to expose EOT to multiple currencies. As fiat currencies and major cryptocurrencies are easily established to pair with EOT, it seemed logical as a good starting point.
It’s important to understand assets on the Waves Platform. Basically, any asset is a representation of a currency and is maintained on the Waves Blockchain. This is separate to the EOT Blockchain and does have a mathematical relationship.
Waves offer five services crucial for EOT to be traded as mentioned in the Waves Whitepaper.
Deletion of Token
Transfer of Token
Anonymous order books
Decentralised Token Exchange
Not all of the wallets on the Waves Platform are in public distribution. The developers control the following Waves wallets with the first address being the seed.
The Waves platform operates assets on its own chain and this is independent to the EOT coin Blockchain. This is to allow Waves assets to be bought and sold on the Waves Platform without interference and to allow for a separate ecosystem to make tokens available.
The cryptography used by the EOT coin is the backbone and the enabler for securing products that use the IoT, not the token. It is the Blockchain that the coin uses that demonstrates transparency and it is the primary functional chain.
There is a mathematical relationship between the coins and the tokens. A reserve of coins is held and equal to the token total supply so we can trade on the Waves Platform.
It is possible for a 1:1 token/coin swap, either way, using the product Swiss Bank In Your Pocket (SBIYP) device. You can purchase this hardware on the available website or senior community members available on Slack and Discord can also swap your coin/token for a small fee. Remember the swap can go either way.
Every token on the Waves chain must be represented on the EOT coin Blockchain to allow for the 1:1 swap. There is a reserve of 100,000,000 EOT coins on the Blockchain allowing this swap to take place.
The following four coin addresses are controlled by the developers and have been put aside for future projects/devices. The first coin address is the original main wallet.
EeJdxdvjEbq1kw7KkGovvLMnAs9h7nB7e9 EVEHaEUdD7hQ4uw9nyr5LteDLNkiigDCwT ETZ7powGjKeCRySD5YWbPLuj52LphXAbfc EL5Km7NNY2wdMfHAmp3BLon7B9tAykQe62
Let’s review the EOT Coin Blockchain Explorer rich-list at the year ending, 31st December 2017 for the mathematical relationship.
This list shows a wealth distribution roughly year ending of 147,399 blocks mined. This would bring 14.7399 million (147399*100 EOT coins) mined EOT coins into circulation with a coin supply of 114.7399 million. This is after adding 100 million of coins held in reserve for the 100 million tokens available on the Waves Platform.
The remaining 85.2601 million coins (100,000,000-14,739,900=85,260,100) coins have not been mined and are not in circulation. Just keep in mind block halving takes place at block 500,000 and at the end of 2017 we were at block 147,399. Every block is recorded at 90 seconds intervals.
Differences Between Blockchain\Cryptocurrency Technologies
There is a difference between the Blockchain and cryptocurrency using the Blockchain.
The EOT coin uses the Blockchain as a ledger distributed over a P2P network that prevents double spending. A consensus is agreed where network participants all agree on the validity of transaction before it is recorded permanently on the Blockchain. The Scrypt algorithm for cryptography is used for this process to work and the EOT coin requires computer power to process this encryption.
When EOT coin is used for functional purposes it then is transferred to inherent private Blockchain where its function is no longer a cryptocurrency but instead has the purpose of using cryptography for data security.
Multiple Blockchains and IoT Products
There are multiple Blockchains using EOT for security. It is important to state that no EOT will be burnt. Any EOT used with any product is reissued back to the ecosystem. The only loss of EOT is when a product is destroyed or a wallet is made unavailable for whatever reason.
The EOT Blockchain is obviously the primary chain, and an alternative chain would be on the Waves Platform enabling the existence of the token. As mentioned above they have a close mathematical relationship allowing the 1:1 swap to take place anytime. This allows the price for the coin and token to be the same.
Other chains mentioned are the inherent chains that allow the functionality of the products. For an example, if using the messaging function with the Bitvault® the encryption and validation for this application would take place using the EOT coin. It would operate on an independent private chain for these actions. Another separate chain would exist if using a different application such as a phone call with the Bitvault®, using encryption software or a Router that uses the EOT coin.
These separate private Blockchains prevent compromise. This is added security making each application independent.
Once the user finishes using the application that private chain is no longer active and the spent EOT coin is then made available to the developing team to redistribute back to the public Blockchain. The redistribution is part of the process and is vital for sustainability.
That private blockchain does not exist for anyone to review and it’s no longer available after the call, message or whatever it was used for. Only the recipients that know the private keys are privy to this chain.
It is important to understand that the EOT Blockchain is a public ledger for the EOT coin and does not reflect the inherent Blockchains.
EOT cryptocurrency is used initially and then at the end of the cycle will end up back on the public Blockchain. Intermediately the EOT coin doesn’t function as a cryptocurrency but uses the cryptography aspect to encrypt and validate.
Trading Dynamics for EOT
Without getting into the entire dynamics of trading the answer is supply and demand.
The focus here is to build wholesale/reseller channels with products given varying audiences in the following industries as examples:
Fintech Companies and Banks
Media and News
Mobile Phone Industry
Building a network of people wanting to use a product that requires EOT will then create a demand. It is the innovation of products to produce this market that is important for the use of EOT.
You can limit the supply to prevent deflationary rates or make it scarce to add value. But what gives anything value is demand. Making the demand for EOT, is a product that requires EOT to be spent. Having products available like the Bitvault®, EOT encryption software, EOT camera’s and EOT Routers etc are examples of products to build a reason to use EOT, it does not build price.
Individual people will have to buy from the market but most expenditure for EOT would be from in-app purchases, for an example when playing a game you would upgrade something in the game, spending EOT. Anyhow, buying from the market increases the price.
Targeting large enterprises gives the opportunity for bulk orders and therefore more EOT to be spent. This is why industries and governmental institutions are targeted. Even with preloaded devices, at some point, these agencies would need to purchase from the market. How often they use the product would determine how quickly they would use EOT. An example would be an EOT Router or EOT camera being continually used. Most cities already stream data and use cameras continuously so once cities become IOT compliant they could consider this avenue and continual use would spend EOT quickly.
Those companies who bought in bulk would have to spend lots of money to purchase EOT on the open market. As large enterprises are targeted it would be better to preload products and include it in the initial cost. This would provide them with price security and increase the chances of them buying into the product giving them market appeal. Agencies buying into a product with this method will enable future EOT price growth, as they need to buy in the future.
Another consideration would be having any product with unspent EOT, this would remove EOT from circulation for a period of time making it scarcer until it is used and returned to the ecosystem. The more products in use, the more EOT removed from the market, therefore, increasing price.
Slowly building customers with products and having real-life solutions will prevent hype. Having hype will lead to a quick price increase and is more often reflected in low quality. You often see a price spike following good news then a price retracement to previous support levels and then continuing to fall if it has no basis. Psychologically the assumption is with the price plummeting after the spike, there was no real cause to sustain a high price, thus hype has a negative connotation. If the project is more robust and people see stability and slow growth, then a slow and steady price increase is demonstrated.
EOT might be held in some products for 3-4 years but again this is limited. The answer is two-fold and depends on how often it is used and what product is in use as commented in above.
At some point in the far future, the pre-mine will be exhausted (because of unavailable wallets or broken/unused products) and no option is left but to buy on the open market. As it is designed now, the recycled EOT has extended this period. This by no means is detrimental but has a business model of sustainability and giving market appeal for buyers of products.
News brings an increase in price and so does FOMO. Having a product behind this cryptocurrency is a rarity and especially with real-life solutions. It is innovation that helps create demand.
Scrypt Technical Specifications
Designed by Colin Percival, Scrypt is a password derivation function and was originally designed for the Tarsnap back-up service. The aim of the algorithm is to derive a key from a password (password-based KDF) for user authentication, encrypting and signing files .
With current hardware, the cost of cracking a password that has been encrypted by Scrypt can exceed 100 billion times more than cracking the same file that has been encrypted with OpenSS1.
By using the subsequent key function the design is to be computer intensive requiring a long time for this process. For authentication, authorized users will perform this function once per operation so the time required is minimal .
With previous password-based KDFs they have low resource demands and are not memory hungry. They can be easily implemented into hardware such as in ASICs and unfortunately can allow an attacker to exploit these resources by building thousands of implementations of the algorithm in the hardware and searching for different subsets of the key space. This reduces the amount of time needed for a brute-force attack making it possible to crack .
The function of Scrypt is to use a large amount of RAM raising the memory resources and to hinder the attempts of an attack. By increasing resource demand, password cracking becomes an expensive exercise, as there is a parallel relationship between the costs of ASICs and the size of ASICs  . Having a strong key derivation function by using a large circuit key (as only half as many copies can be placed on an area of silicon) will increase the length of time .
Theoretically, a memory-hard algorithm on RAM is an algorithm which uses S(n) space and T(n) operations, where S(n) ∈ Ω T(n)1−ε . This uses the largest amount of storage possible for the same running time .
Scrypt is sequential memory-hard and is very secure against hardware attacks while using a lot of memory.
A sequential memory-hard function is a function which (a) can be computed by a memory-hard algorithm on a Random Access Machine in T(n) operations; and (b) cannot be computed on a Parallel Random Access Machine with S∗(n) processors and S∗(n) space in expected time T∗(n) where S∗(n)T∗(n) = O(T(n)2−x) for any x > 0 .
“A memory-hard algorithm is thus an algorithm which asymptotically uses almost as many memory locations as it uses operations; it can also be thought of as an algorithm which comes close to using the most memory possible for a given number of operations, since by treating memory addresses as keys to a hash table it is trivial to limit a Random Access Machine to an address space proportional to its running time” .
This proportionate amount of memory is also equivalent the number of operations performed making the cost of hardware for this operation expensive.
The following is the ROMix algorithm and has a hash function H, an input B, and an integer parameter N compute
V i=Hi(B) 0≤i<N
and X = HN(B), then iterate
j ← Integerify(X ) mod N
X ← H (X ⊕ Vj)
N times; and output X.
The ROMix algorithm is best thought to produce a large number of random values and to access them randomly so they are then stored on the RAM.
Having large vector of pseudorandom bit strings is the cause for this large memory requirement and once generated are used in a pseudo-random sequence to produce the derived key. ROMix fills V with these pseudo-random values before accessing them. If the process were to be straightforward the vector would be kept in the RAM and accessed when needed .
In reality elements of the vector are generated algorithmically and are expected to be accessed many times causing a trade-off in speed in order to remove large memory requirements. It is this trade-off where memory requirements are decreased by doing more operations and taking longer, or a speed increased by using more memory, that is behind the algorithm. That is to say, Scrypt exploits the costs in either direction .
So what does this practically mean? With cracking passwords we find the financial cost is parallel so if you double the hardware used (eg ASIC), the time taken is half.
Cost of ASICs ≍ size of ASICs
When used for logins Scrypt is: 
≈ 25 times more expensive to attack than bcrypt
≈ 28 times more expensive to attack than PBKDF2
≈ 215 times more expensive to attack than MD5 CRYPT
When for file encryption Scrypt is: 
≈ 212 times more expensive to attack than bcrypt
≈ 215 times more expensive to attack than PBKDF2
≈ 237 times more expensive to attack than MD5
To best way to calculate the cost is to count the cryptographic operations for the time and the size of the chunk, that is to say, area of silicon wafer that corresponds to one chip (die)  . It is fair to assume this is accurate as key derivations functions are mostly cryptographic. Scrypt is memory resource hungry and the die area required for cost calculations is also considered (memory costs are expensive).
To further this cost other parts of the ASICs such as power supply units, packaging, operational costs and electronic boards have been reported adding to password-cracking costs by a factor of 10 .
Having both CPU and RAM cost to consider Colin, when designing Scrypt assumed the costs into three factors: “N”, “r”, and “p”. The resulting memory usage is calculated as follows: .
Memory in bytes = (N * r * 128) + (r * p * 128)
- PBKDF2 is used to convert a password into a bitstream (key derivation)
- Feed this bitstream to ROMix
- Feed the output of ROMix back to PBKDF2 to generate the derived key
Cryptographic primitives used:
- HMAC-SHA256 Salsa20/8 core
- The Salsa20/8 core outputs lots of bits very fast, which means that Scrypt can use lots of memory .
For a more detailed explanation of the Scrypt algorithm please refer to:
Dark Gravity Wave
EOT coin has implemented Dark Gravity Wave (DGW) as a response to the time-warp exploit found in Kimoto’s Gravity Well. By using data found in the previous block, difficulty adjustments are made while preserving the block-time .
Created by Even Duffield, DGW is a mining regulator that uses moving averages to best retarget the difficulty. Retargeting the difficulty causes adjustments against larger fluctuations in mining power smoothing out this process making it fair .
The protection against the time-warp exploit prevents a miner from mining an array of blocks over everyone else’s and high-jacking the blockchain. Faster transactions can sometimes be a consequence as confirmation times from exchanges may be lowered. Other benefits may include less orphan blocks due to regular block intervals .