Dilithion: A Post-Quantum Cryptocurrency

Whitepaper

Version 2.0

March 2026

Mainnet Live Since: January 2026

Abstract

Dilithion is a decentralized cryptocurrency designed from the ground up for the post-quantum era. As quantum computers advance toward breaking classical cryptographic systems like ECDSA and RSA, the need for quantum-resistant blockchain technology becomes critical. Dilithion addresses this threat by implementing CRYSTALS-Dilithium, a NIST-standardized post-quantum digital signature scheme, combined with RandomX proof-of-work for ASIC-resistant CPU mining.

Since its mainnet launch in January 2026, Dilithion has expanded into a dual-chain ecosystem: DIL, the original RandomX proof-of-work chain, and DilV, a companion chain using Verifiable Delay Functions (VDF) for hardware-neutral block distribution. The ecosystem includes Digital DNA, a novel anonymous Sybil defense system based on unforgeable physical properties, and a bridge to Base (Coinbase L2) enabling DeFi participation.

This whitepaper presents Dilithion's technical architecture, consensus mechanisms, fair mining protocol, Digital DNA identity system, economic model, and cross-chain infrastructure.

Key Features:


Important Disclosure

Experimental Nature: Dilithion is an experimental cryptocurrency project. This software has NOT been professionally audited and may contain bugs or vulnerabilities. Use at your own risk.

AI-Assisted Development: This project was developed with AI assistance (Anthropic's Claude Code). While AI tools enable rapid development and comprehensive documentation, all code requires careful human review and community scrutiny. We believe in full transparency about our development methods.

No Guarantees: This project comes with no guarantee of success, security, or value. Users assume all risks. This is not financial advice. Do your own research (DYOR) before participating.


Table of Contents


1. Introduction: The Quantum Threat

1.1 The Problem

Modern cryptocurrency security relies on classical cryptography:

Shor's Algorithm (1994) demonstrated that quantum computers can break ECDSA and RSA in polynomial time. While SHA-256 mining receives only a modest speedup (Grover's algorithm), digital signatures are critically vulnerable.

1.2 Timeline to Quantum Threat

Current State (2025-2026):

Expert Estimates:

Conclusion: Cryptocurrencies must transition to post-quantum cryptography now to remain secure over their multi-decade lifespan.

1.3 Existing Cryptocurrency Vulnerability

Cryptocurrency Signature Scheme Quantum Vulnerable? Migration Plan?
Bitcoin ECDSA Yes None announced
Ethereum ECDSA Yes Research phase only
Litecoin ECDSA Yes None announced
Monero EdDSA Yes None announced
Dilithion Dilithium3 No Built-in from genesis

Critical Issue: Retrofitting existing blockchains with post-quantum cryptography requires:

Dilithion's Solution: Start with post-quantum cryptography from genesis block.


2. Post-Quantum Cryptography

2.1 CRYSTALS-Dilithium

Selection Process:

Why Dilithium?

Dilithion uses Dilithium3:

2.2 Comparison to Classical Cryptography

Metric ECDSA (secp256k1) Dilithium3 Ratio
Public key 33 bytes 1,952 bytes 59x larger
Signature 72 bytes 3,309 bytes 46x larger
Security ~128-bit 192-bit (quantum-safe) More secure
Signing time <1 ms 1-2 ms Comparable
Verify time ~1 ms ~1 ms Identical
Quantum safe? No Yes Critical advantage

Trade-off: Dilithion transactions are ~15x larger than Bitcoin transactions, but provide quantum resistance. This trade-off is mitigated by the 4 MB block size limit.

2.3 SHA-3 Hashing

Dilithion uses SHA-3 (Keccak) throughout:

Why SHA-3?


3. Technical Architecture

3.1 Dual-Chain Ecosystem

Dilithion operates as a dual-chain ecosystem: DIL (proof-of-work) and DilV (VDF distribution). Both chains share the same post-quantum cryptographic foundation but serve different purposes.

Dilithion Ecosystem
DIL Chain (PoW)
RandomX CPU Mining
4-minute blocks
50 DIL/block
21M total supply
DilV Chain (VDF)
Lowest-Output-Wins
45-second blocks
100 DilV/block
210M total supply
Shared Foundation
Dilithium3 Signatures · SHA-3 Hashing · Digital DNA
MIK Identity · DFMP Fair Mining · HTLC Atomic Swaps
Bridge to Base (Coinbase L2)
wDIL (ERC-20) · wDILV (ERC-20) · Aerodrome DEX

3.2 Transaction Structure

class CTransaction {
    int32_t nVersion;               // Transaction version
    std::vector<CTxIn> vin;         // Inputs
    std::vector<CTxOut> vout;       // Outputs
    uint32_t nLockTime;             // Lock time
};

class CTxIn {
    COutPoint prevout;              // Previous output reference
    std::vector<uint8_t> scriptSig; // Dilithium signature (3,309 bytes)
    uint32_t nSequence;             // Sequence number
};

class CTxOut {
    CAmount nValue;                 // Amount in ions (smallest unit)
    std::vector<uint8_t> scriptPubKey; // Dilithium public key (1,952 bytes)
};

Typical Transaction Sizes:

Comparison to Bitcoin:

3.3 Currency Units

Chain Base Unit Smallest Unit Relationship
DIL DIL ion 1 DIL = 100,000,000 ions
DilV DilV volt 1 DilV = 100,000,000 volts

3.4 Block Structure

class CBlockHeader {
    int32_t nVersion;               // Block version
    uint256 hashPrevBlock;          // Previous block hash (SHA-3)
    uint256 hashMerkleRoot;         // Merkle root of transactions
    uint32_t nTime;                 // Block timestamp
    uint32_t nBits;                 // Difficulty target (compact)
    uint32_t nNonce;                // RandomX nonce (PoW) or 0 (VDF)
};

4. Consensus Mechanisms

4.1 DIL: RandomX Proof-of-Work

The DIL chain uses RandomX proof-of-work, the same algorithm used by Monero. RandomX is designed to be optimal for general-purpose CPUs and resistant to ASIC and GPU optimization.

RandomX Characteristics:

Block Parameters (DIL):

ParameterValue
Block time target240 seconds (4 minutes)
Maximum block size4 MB
Coinbase maturity100 blocks
Max reorg depth100 blocks
P2P port8444
RPC port8332

Why 4-minute blocks?

4.2 DilV: Verifiable Delay Functions

The DilV chain uses a fundamentally different consensus mechanism: Verifiable Delay Functions (VDF). Instead of competing on hash rate (who has more CPUs), DilV miners compete on luck (lowest output wins) after completing a mandatory sequential computation.

How VDF Consensus Works:

  1. Each miner computes a unique VDF challenge: SHA3-256(prev_block_hash || height || miner_address)
  2. The VDF performs 500,000 sequential squarings in a class group (using the Chia VDF library)
  3. This takes approximately 4-8 seconds on typical hardware
  4. The miner with the lowest VDF output wins the block
  5. A Wesolowski proof (~100 bytes) allows instant verification (~1ms)

Key Properties:

Block Parameters (DilV):

ParameterValue
Block time target45 seconds
VDF iterations500,000
Grace period12 seconds (for slower miners to submit)
Minimum block time20 seconds
Maximum block size4 MB
Coinbase maturity6 blocks (~4.5 minutes)
P2P port9444
RPC port9332

Why a separate chain?

4.3 ASERT Difficulty Adjustment (DIL)

The DIL chain uses the Absolutely Scheduled Exponential Rising Targets (ASERT) difficulty adjustment algorithm, based on Bitcoin Cash's aserti3-2d implementation (November 2020).

Formula:

next_target = anchor_target * 2^((time_delta - blockTime * height_delta) / halflife)

Properties:

ASERT provides smooth, responsive difficulty adjustment without the oscillation problems of periodic retargeting algorithms.

4.4 Timestamp Validation

A hard fork at block height 24,500 tightened timestamp rules to prevent gaming:

This prevents timestamp manipulation attacks that could game difficulty calculations.


5. Fair Mining Protocol (DFMP)

The Dilithion Fair Mining Protocol (DFMP) ensures that block rewards are distributed fairly across the mining community. It prevents any single entity from dominating block production by tracking mining identity and penalizing excessive concentration.

5.1 Miner Identity Keys (MIK)

Every miner must register a persistent Miner Identity Key (MIK)—a 20-byte identity encoded in the coinbase transaction of each block they mine. MIK is required from block 1 on both chains.

Properties:

5.2 Payout Heat Tracking

DFMP tracks the "heat" of each MIK identity across a rolling observation window. Mining too frequently incurs escalating penalties.

Current Parameters (v3.3):

Effect: A miner operating one identity can mine ~12 blocks per observation window without penalty. Running multiple identities (Sybil attack) is detected by Digital DNA. This creates a natural incentive for a decentralized mining distribution.


6. Digital DNA: Anonymous Sybil Defense

Digital DNA is Dilithion's novel approach to Sybil defense. It creates an unforgeable identity fingerprint for each mining node based on physical properties that cannot be faked—without requiring any personal information, KYC, or trusted hardware.

Key Principle: Digital DNA uses physics as proof of identity. The speed of light determines network latency. Hardware architecture determines computation timing. Crystal oscillators have unique drift characteristics. These properties are inherent to the physical machine and cannot be spoofed.

6.1 Eight Identity Dimensions

Core Dimensions (unforgeable physics-based)

L — Latency Fingerprint: Geographic location via Round-Trip Time (RTT) to the four mainnet seed nodes (New York, London, Singapore, Sydney). A miner's latency profile is determined by their physical position on the globe and the speed of light through fiber optic cables. Spoofing requires physically relocating or adding intentional delay (which is detectable as inconsistency).

V — VDF Timing Signature: Hardware fingerprint via VDF computation speed. Different CPUs (architecture, cache hierarchy, clock speed) produce subtly different VDF computation profiles. The timing collector runs 1,000,000 VDF iterations and records checkpoint timings that characterize the hardware.

P — Perspective Proof: Network vantage point via peer observations. Each node connects to a unique set of peers depending on its network position. The Jaccard similarity of peer sets reveals whether two nodes occupy the same network location.

Extended Dimensions (v3.0)

M — Memory Fingerprint: Cache hierarchy probing that characterizes L1/L2/L3 cache sizes and access latencies. Different hardware has measurably different memory architectures.

D — Clock Drift: Crystal oscillator uniqueness. Every quartz crystal has a slightly different resonant frequency, creating a unique timing drift pattern that is consistent over time and different between machines.

B — Bandwidth Proof: Network throughput measurement. Upload and download speeds characterize the miner's network connection.

T — Thermal Profile: Cooling curve from VDF checkpoints. Different cooling solutions (air, liquid, passive) produce different thermal signatures during sustained computation.

BP — Behavioral Profile: Protocol participation patterns including block reception timing and transaction relay latency. These patterns reflect both network position and hardware characteristics.

6.2 Similarity Detection

When a new mining identity registers, its Digital DNA is compared against all existing identities using equal-weight averaging across all available dimensions:

Threshold Score Action
Different < 0.55 No action (unique identity)
Suspicious ≥ 0.55 Identity flagged for verification challenge
Same Identity ≥ 0.92 Automatic rejection (Sybil detected)

Physics hard rule: If both Memory and Clock Drift similarity exceed 0.95, the probability of two distinct physical machines producing both values is vanishingly small—automatic rejection regardless of combined score.

Current status: Digital DNA is active on mainnet (since block 30,000) and on DilV from genesis. It currently operates in advisory mode—flagging suspicious identities without rejecting blocks. This allows calibration of thresholds before enforcement.

6.3 Privacy by Design

Digital DNA achieves Sybil resistance without compromising privacy:


7. Economic Model

7.1 DIL Supply Schedule

Total Supply:    21,000,000 DIL (fixed cap)
Initial Reward:  50 DIL per block
Block Time:      4 minutes (240 seconds)
Halving:         Every 210,000 blocks (~1.6 years)
Halving Block Range Reward Duration DIL Mined Cumulative %
0 0 - 209,999 50 DIL 1.60 years 10,500,000 50.0%
1 210k - 419,999 25 DIL 1.60 years 5,250,000 75.0%
2 420k - 629,999 12.5 DIL 1.60 years 2,625,000 87.5%
3 630k - 839,999 6.25 DIL 1.60 years 1,312,500 93.75%
4+ 840k+ <6.25 DIL continuing ~1,312,500 ~100%

Comparison to Bitcoin: Dilithion's emission is exactly 2.5x faster than Bitcoin (matching the block time ratio of 4 min vs. 10 min). Same total supply (21M), same halving interval (210,000 blocks), but halvings occur every ~1.6 years instead of ~4 years.

7.2 DilV Supply Schedule

Total Supply:    210,000,000 DilV (fixed cap)
Initial Reward:  100 DilV per block
Block Time:      45 seconds
Halving:         Every 1,050,000 blocks (~1.5 years)
Halving Reward Duration DilV Mined Cumulative %
0 100 DilV ~1.5 years 105,000,000 50.0%
1 50 DilV ~1.5 years 52,500,000 75.0%
2 25 DilV ~1.5 years 26,250,000 87.5%
3 12.5 DilV ~1.5 years 13,125,000 93.75%

DilV's faster block time (45s vs. 4min) and higher initial reward (100 vs. 50) are balanced by a proportionally larger halving interval (1,050,000 blocks vs. 210,000 blocks), resulting in a similar ~1.5 year halving cadence.

7.3 Mining Development Contribution

Both chains implement a 2% mining development contribution—not a premine, but an ongoing transparent allocation from block subsidies:

DIL Block Subsidy: 50 DIL (100%)
├── Miner Reward:     49 DIL (98%)
├── Dev Fund:         0.5 DIL (1%)
└── Developer Reward: 0.5 DIL (1%)

DilV Block Subsidy: 100 DilV (100%)
├── Miner Reward:     98 DilV (98%)
├── Dev Fund:         1.0 DilV (1%)
└── Developer Reward: 1.0 DilV (1%)

Hardcoded Addresses:

All nodes validate that mined blocks include the correct development outputs at the correct amounts. Blocks without valid development outputs are rejected by the network.

7.4 Transaction Fees

Fee Model:

Fees remain negligible to encourage usage while providing spam protection. The fee market will evolve as adoption grows.


8. Bridge to Base

Dilithion includes a bridge to Base (Coinbase L2), allowing native DIL and DilV to be represented as ERC-20 tokens on Ethereum's L2 ecosystem.

8.1 Architecture

The bridge uses a lock-and-mint / burn-and-release model:

  1. Deposit: User sends native DIL/DilV to a designated bridge address on the native chain
  2. Mint: After confirmation, the bridge relayer calls mint() on the ERC-20 contract on Base, creating wrapped tokens
  3. Trade: Wrapped tokens (wDIL, wDILV) can be traded on Aerodrome and other Base DEXes
  4. Withdraw: User calls burn() on the ERC-20 contract, specifying their native chain address
  5. Release: The bridge relayer detects the burn event and sends native tokens to the specified address

8.2 Wrapped Tokens

PropertywDILwDILV
StandardERC-20ERC-20
NameWrapped DILWrapped DilV
SymbolwDILwDILV
Decimals88
Replay ProtectionNative txid trackingNative txid tracking
PausableYes (emergency stop)Yes (emergency stop)

8.3 Security Model

Current: Custodial bridge operated by the development team. The bridge owner controls minting authority.

Safety features:

Upgrade path: Migrate minting authority to a 3-of-5 Gnosis Safe multisig for decentralized control.


9. Network Security

9.1 Attack Vector Analysis

51% Attack (DIL)

Defenses: RandomX CPU mining means an attacker must acquire thousands of consumer CPUs. No ASIC shortcut exists. Combined with DFMP heat tracking, sustained dominance by a single identity triggers escalating penalties.

Risk Level: LOW (economically impractical)

Sybil Attack (Both Chains)

Definition: Attacker creates many fake mining identities to circumvent DFMP fair mining limits.

Defenses:

Risk Level: LOW (Digital DNA makes Sybil identities detectable)

Eclipse Attack

Defenses:

Risk Level: LOW (standard Bitcoin-style defenses)

Quantum Computer Attack

Defense: Dilithion is quantum-safe by design:

Risk Level: NONE (primary design goal)

9.2 Wallet Security

9.3 Network Infrastructure


10. Development History

Dilithion has been under active development since late 2025, with rapid iteration on mainnet. All development is open-source on GitHub.

10.1 Shipped Features (as of March 2026)

FeatureStatusDescription
Post-Quantum CoreLiveDilithium3 signatures, SHA-3 hashing, RandomX mining
Fair Mining (DFMP)LiveMIK identity, payout heat tracking, anti-whale penalties
ASERT DifficultyLivePer-block exponential difficulty adjustment
Timestamp ValidationLiveHard fork at height 24,500 tightening timestamp rules
Digital DNALive8-dimension identity fingerprinting (advisory mode)
DilV ChainLiveVDF-based companion chain with 45-second blocks
VDF ConsensusLiveChia VDF library, lowest-output-wins distribution
Bridge to BaseLivewDIL and wDILV ERC-20 tokens on Base L2
DEX LiquidityLiveAerodrome pools for wDIL and wDILV
Web WalletLiveBrowser-based wallet with DIL/DilV support
HTLC ScriptsLive (DilV)Hash Time-Locked Contracts for atomic swaps
Price PageLiveReal-time price data from Aerodrome + CoinGecko

10.2 Roadmap

Near-term:

Medium-term:

Long-term:


11. Conclusion

11.1 What Makes Dilithion Different

Feature Bitcoin Ethereum Dilithion
Quantum-safe signatures No No Yes (NIST standard)
ASIC-resistant mining No N/A (PoS) Yes (RandomX)
Sybil defense None Economic (stake) Digital DNA (physics-based)
Hardware-neutral chain No No Yes (DilV/VDF)
Fair mining protocol No No Yes (DFMP/MIK)
Fixed supply Yes (21M) No Yes (21M DIL, 210M DilV)
L2 bridge No native Native Yes (Base L2)

11.2 Fair Launch Principles

Dilithion adheres to fair launch principles:

11.3 Vision

Dilithion aims to be the standard for quantum-safe cryptocurrency—a store of value and medium of exchange that remains secure as quantum computing advances. With dual-chain architecture, physics-based Sybil defense, and cross-chain interoperability, Dilithion is building a complete ecosystem for the post-quantum era.

Mission Statement:
"Secure digital currency for the quantum age, built by the community, for the community."

Technical Specifications Summary

Parameter DIL DilV
Consensus RandomX Proof-of-Work VDF (Lowest Output Wins)
Total Supply 21,000,000 DIL 210,000,000 DilV
Block Time 240 seconds (4 minutes) 45 seconds
Block Reward 50 DIL (49 to miner) 100 DilV (98 to miner)
Halving Interval 210,000 blocks (~1.6 years) 1,050,000 blocks (~1.5 years)
Max Block Size 4 MB 4 MB
Coinbase Maturity 100 blocks 6 blocks
Dev Contribution 2% (1% fund + 1% reward) 2% (1% fund + 1% reward)
Signature Algorithm CRYSTALS-Dilithium3 (NIST FIPS 204)
Hash Algorithm SHA-3-256 (NIST FIPS 202)
Smallest Unit ion (10-8 DIL) volt (10-8 DilV)
P2P Port 8444 9444
RPC Port 8332 9332
Digital DNA Active (height 30,000) Active (from genesis)
Difficulty ASERT (per-block) N/A (VDF distribution)
Network Magic 0xD1714102 0xD17FD100
Chain ID 1 2
Bridge Token wDIL (ERC-20 on Base) wDILV (ERC-20 on Base)

References

  1. NIST. (2024). FIPS 204: Module-Lattice-Based Digital Signature Standard. National Institute of Standards and Technology.
  2. Ducas, L., et al. (2018). CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme. IACR Transactions on Cryptographic Hardware and Embedded Systems.
  3. Shor, P. (1994). Algorithms for quantum computation: Discrete logarithms and factoring. Proceedings 35th Annual Symposium on Foundations of Computer Science.
  4. National Academies of Sciences, Engineering, and Medicine. (2019). Quantum Computing: Progress and Prospects. The National Academies Press.
  5. Monero Research Lab. (2019). RandomX: CPU-optimized Proof-of-Work. https://github.com/tevador/RandomX
  6. Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System.
  7. Bernstein, D. J., et al. (2015). Post-quantum cryptography. Nature, 549(7671), 188-194.
  8. Bitcoin Cash. (2020). aserti3-2d: Absolutely Scheduled Exponential Rising Targets. CHIP-2020-11-15.
  9. Wesolowski, B. (2019). Efficient Verifiable Delay Functions. Advances in Cryptology – EUROCRYPT 2019.
  10. Cohen, B., et al. (2019). Chia VDF: Verifiable Delay Functions for Proof of Space. Chia Network.

Appendix A: Glossary

ASERT
Absolutely Scheduled Exponential Rising Targets. Per-block difficulty adjustment algorithm anchored to a fixed reference point.
ASIC (Application-Specific Integrated Circuit)
Specialized hardware designed for a specific task. Dilithion uses RandomX to resist ASICs.
CRYSTALS-Dilithium
NIST-standardized post-quantum digital signature scheme based on lattice cryptography.
DFMP (Dilithion Fair Mining Protocol)
Identity-based mining fairness system using MIK keys and payout heat tracking.
Digital DNA
Anonymous identity fingerprinting system using 8 unforgeable physical dimensions for Sybil detection.
DilV
Dilithion's companion chain using VDF consensus. 45-second blocks, 210M total supply.
Halving
Reduction of block reward by 50%. Occurs every 210,000 blocks for DIL (~1.6 years) and every 1,050,000 blocks for DilV (~1.5 years).
HTLC (Hash Time-Locked Contract)
Script that enables trustless atomic swaps between chains using hash preimage revelation with timeout.
Lattice Cryptography
Post-quantum cryptographic approach based on hard mathematical problems in lattice structures.
MIK (Miner Identity Key)
Persistent 20-byte mining identity required in every coinbase transaction. Enables DFMP and Digital DNA.
Module-LWE
Learning With Errors over Module Lattices, the hard problem underlying Dilithium's security.
RandomX
ASIC-resistant proof-of-work algorithm optimized for general-purpose CPUs. Used by Monero.
SHA-3
Secure Hash Algorithm 3, NIST-standardized hash function (Keccak).
Shor's Algorithm
Quantum algorithm that can break RSA and ECDSA in polynomial time.
VDF (Verifiable Delay Function)
A function that takes a prescribed amount of sequential computation to evaluate, but whose result can be efficiently verified.
wDIL / wDILV
Wrapped DIL and Wrapped DilV. ERC-20 tokens on Base (Coinbase L2) representing bridged native tokens.

Appendix B: Contact & Community

Website: https://dilithion.org

GitHub: https://github.com/dilithion/dilithion

Discord: https://discord.gg/dilithion

Telegram: https://t.me/dilithion


Dilithion Whitepaper v2.0
March 2026
"Quantum-Safe. Community-Driven. Fair Launch."


Disclaimer: This whitepaper is for informational and educational purposes only and does not constitute investment, financial, or legal advice. Dilithion is EXPERIMENTAL software developed with AI assistance and has NOT been professionally audited. The software may contain bugs, vulnerabilities, or design flaws. Cryptocurrency investments carry significant risk, including total loss of funds. No guarantees are made regarding security, functionality, future value, adoption, or success. Use this software entirely at your own risk. Users are responsible for securing their own keys and funds. Always do your own research (DYOR) and consult with qualified professionals before participating in any cryptocurrency project.