Tokens are encrypted twice using GOST R 34 series algorithms. The algorithms form a unique sequence of numbers on the basis of which key pairs are generated. Therefore, in the group of all possible solutions the keys are always unique.

Lets compare the durability of the algorithm GOST R 34 with SHA-256, which is used in Bitcoin.

SHA-256 can be hacked with the help of modern technologies: in 2008 Somitra Kumar Sanadia and
Palash Sarkar published the collisions they found for 22 iterations. After that programmers found ways to crack 31 more iteration of SHA-256.

The GOST R 34 series…

VEDA

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store