Whitepaper
Version 2.0
March 2026
Mainnet Live Since: January 2026
Dilithion is a decentralized cryptocurrency designed from the ground up for the post-quantum era. As quantum computers advance toward breaking classical cryptographic systems like ECDSA and RSA, the need for quantum-resistant blockchain technology becomes critical. Dilithion addresses this threat by implementing CRYSTALS-Dilithium, a NIST-standardized post-quantum digital signature scheme, combined with RandomX proof-of-work for ASIC-resistant CPU mining.
Since its mainnet launch in January 2026, Dilithion has expanded into a dual-chain ecosystem: DIL, the original RandomX proof-of-work chain, and DilV, a companion chain using Verifiable Delay Functions (VDF) for hardware-neutral block distribution. The ecosystem includes Digital DNA, a novel anonymous Sybil defense system based on unforgeable physical properties, and a bridge to Base (Coinbase L2) enabling DeFi participation.
This whitepaper presents Dilithion's technical architecture, consensus mechanisms, fair mining protocol, Digital DNA identity system, economic model, and cross-chain infrastructure.
Key Features:
Experimental Nature: Dilithion is an experimental cryptocurrency project. This software has NOT been professionally audited and may contain bugs or vulnerabilities. Use at your own risk.
AI-Assisted Development: This project was developed with AI assistance (Anthropic's Claude Code). While AI tools enable rapid development and comprehensive documentation, all code requires careful human review and community scrutiny. We believe in full transparency about our development methods.
No Guarantees: This project comes with no guarantee of success, security, or value. Users assume all risks. This is not financial advice. Do your own research (DYOR) before participating.
Modern cryptocurrency security relies on classical cryptography:
Shor's Algorithm (1994) demonstrated that quantum computers can break ECDSA and RSA in polynomial time. While SHA-256 mining receives only a modest speedup (Grover's algorithm), digital signatures are critically vulnerable.
Current State (2025-2026):
Expert Estimates:
Conclusion: Cryptocurrencies must transition to post-quantum cryptography now to remain secure over their multi-decade lifespan.
| Cryptocurrency | Signature Scheme | Quantum Vulnerable? | Migration Plan? |
|---|---|---|---|
| Bitcoin | ECDSA | Yes | None announced |
| Ethereum | ECDSA | Yes | Research phase only |
| Litecoin | ECDSA | Yes | None announced |
| Monero | EdDSA | Yes | None announced |
| Dilithion | Dilithium3 | No | Built-in from genesis |
Critical Issue: Retrofitting existing blockchains with post-quantum cryptography requires:
Dilithion's Solution: Start with post-quantum cryptography from genesis block.
Selection Process:
Why Dilithium?
Dilithion uses Dilithium3:
| Metric | ECDSA (secp256k1) | Dilithium3 | Ratio |
|---|---|---|---|
| Public key | 33 bytes | 1,952 bytes | 59x larger |
| Signature | 72 bytes | 3,309 bytes | 46x larger |
| Security | ~128-bit | 192-bit (quantum-safe) | More secure |
| Signing time | <1 ms | 1-2 ms | Comparable |
| Verify time | ~1 ms | ~1 ms | Identical |
| Quantum safe? | No | Yes | Critical advantage |
Trade-off: Dilithion transactions are ~15x larger than Bitcoin transactions, but provide quantum resistance. This trade-off is mitigated by the 4 MB block size limit.
Dilithion uses SHA-3 (Keccak) throughout:
Why SHA-3?
Dilithion operates as a dual-chain ecosystem: DIL (proof-of-work) and DilV (VDF distribution). Both chains share the same post-quantum cryptographic foundation but serve different purposes.
class CTransaction {
int32_t nVersion; // Transaction version
std::vector<CTxIn> vin; // Inputs
std::vector<CTxOut> vout; // Outputs
uint32_t nLockTime; // Lock time
};
class CTxIn {
COutPoint prevout; // Previous output reference
std::vector<uint8_t> scriptSig; // Dilithium signature (3,309 bytes)
uint32_t nSequence; // Sequence number
};
class CTxOut {
CAmount nValue; // Amount in ions (smallest unit)
std::vector<uint8_t> scriptPubKey; // Dilithium public key (1,952 bytes)
};
Typical Transaction Sizes:
Comparison to Bitcoin:
| Chain | Base Unit | Smallest Unit | Relationship |
|---|---|---|---|
| DIL | DIL | ion | 1 DIL = 100,000,000 ions |
| DilV | DilV | volt | 1 DilV = 100,000,000 volts |
class CBlockHeader {
int32_t nVersion; // Block version
uint256 hashPrevBlock; // Previous block hash (SHA-3)
uint256 hashMerkleRoot; // Merkle root of transactions
uint32_t nTime; // Block timestamp
uint32_t nBits; // Difficulty target (compact)
uint32_t nNonce; // RandomX nonce (PoW) or 0 (VDF)
};
The DIL chain uses RandomX proof-of-work, the same algorithm used by Monero. RandomX is designed to be optimal for general-purpose CPUs and resistant to ASIC and GPU optimization.
RandomX Characteristics:
Block Parameters (DIL):
| Parameter | Value |
|---|---|
| Block time target | 240 seconds (4 minutes) |
| Maximum block size | 4 MB |
| Coinbase maturity | 100 blocks |
| Max reorg depth | 100 blocks |
| P2P port | 8444 |
| RPC port | 8332 |
Why 4-minute blocks?
The DilV chain uses a fundamentally different consensus mechanism: Verifiable Delay Functions (VDF). Instead of competing on hash rate (who has more CPUs), DilV miners compete on luck (lowest output wins) after completing a mandatory sequential computation.
How VDF Consensus Works:
SHA3-256(prev_block_hash || height || miner_address)Key Properties:
Block Parameters (DilV):
| Parameter | Value |
|---|---|
| Block time target | 45 seconds |
| VDF iterations | 500,000 |
| Grace period | 12 seconds (for slower miners to submit) |
| Minimum block time | 20 seconds |
| Maximum block size | 4 MB |
| Coinbase maturity | 6 blocks (~4.5 minutes) |
| P2P port | 9444 |
| RPC port | 9332 |
Why a separate chain?
The DIL chain uses the Absolutely Scheduled Exponential Rising Targets (ASERT) difficulty adjustment algorithm, based on Bitcoin Cash's aserti3-2d implementation (November 2020).
Formula:
next_target = anchor_target * 2^((time_delta - blockTime * height_delta) / halflife)
Properties:
ASERT provides smooth, responsive difficulty adjustment without the oscillation problems of periodic retargeting algorithms.
A hard fork at block height 24,500 tightened timestamp rules to prevent gaming:
This prevents timestamp manipulation attacks that could game difficulty calculations.
The Dilithion Fair Mining Protocol (DFMP) ensures that block rewards are distributed fairly across the mining community. It prevents any single entity from dominating block production by tracking mining identity and penalizing excessive concentration.
Every miner must register a persistent Miner Identity Key (MIK)—a 20-byte identity encoded in the coinbase transaction of each block they mine. MIK is required from block 1 on both chains.
Properties:
DFMP tracks the "heat" of each MIK identity across a rolling observation window. Mining too frequently incurs escalating penalties.
Current Parameters (v3.3):
Effect: A miner operating one identity can mine ~12 blocks per observation window without penalty. Running multiple identities (Sybil attack) is detected by Digital DNA. This creates a natural incentive for a decentralized mining distribution.
Digital DNA is Dilithion's novel approach to Sybil defense. It creates an unforgeable identity fingerprint for each mining node based on physical properties that cannot be faked—without requiring any personal information, KYC, or trusted hardware.
Key Principle: Digital DNA uses physics as proof of identity. The speed of light determines network latency. Hardware architecture determines computation timing. Crystal oscillators have unique drift characteristics. These properties are inherent to the physical machine and cannot be spoofed.
L — Latency Fingerprint: Geographic location via Round-Trip Time (RTT) to the four mainnet seed nodes (New York, London, Singapore, Sydney). A miner's latency profile is determined by their physical position on the globe and the speed of light through fiber optic cables. Spoofing requires physically relocating or adding intentional delay (which is detectable as inconsistency).
V — VDF Timing Signature: Hardware fingerprint via VDF computation speed. Different CPUs (architecture, cache hierarchy, clock speed) produce subtly different VDF computation profiles. The timing collector runs 1,000,000 VDF iterations and records checkpoint timings that characterize the hardware.
P — Perspective Proof: Network vantage point via peer observations. Each node connects to a unique set of peers depending on its network position. The Jaccard similarity of peer sets reveals whether two nodes occupy the same network location.
M — Memory Fingerprint: Cache hierarchy probing that characterizes L1/L2/L3 cache sizes and access latencies. Different hardware has measurably different memory architectures.
D — Clock Drift: Crystal oscillator uniqueness. Every quartz crystal has a slightly different resonant frequency, creating a unique timing drift pattern that is consistent over time and different between machines.
B — Bandwidth Proof: Network throughput measurement. Upload and download speeds characterize the miner's network connection.
T — Thermal Profile: Cooling curve from VDF checkpoints. Different cooling solutions (air, liquid, passive) produce different thermal signatures during sustained computation.
BP — Behavioral Profile: Protocol participation patterns including block reception timing and transaction relay latency. These patterns reflect both network position and hardware characteristics.
When a new mining identity registers, its Digital DNA is compared against all existing identities using equal-weight averaging across all available dimensions:
| Threshold | Score | Action |
|---|---|---|
| Different | < 0.55 | No action (unique identity) |
| Suspicious | ≥ 0.55 | Identity flagged for verification challenge |
| Same Identity | ≥ 0.92 | Automatic rejection (Sybil detected) |
Physics hard rule: If both Memory and Clock Drift similarity exceed 0.95, the probability of two distinct physical machines producing both values is vanishingly small—automatic rejection regardless of combined score.
Current status: Digital DNA is active on mainnet (since block 30,000) and on DilV from genesis. It currently operates in advisory mode—flagging suspicious identities without rejecting blocks. This allows calibration of thresholds before enforcement.
Digital DNA achieves Sybil resistance without compromising privacy:
Total Supply: 21,000,000 DIL (fixed cap) Initial Reward: 50 DIL per block Block Time: 4 minutes (240 seconds) Halving: Every 210,000 blocks (~1.6 years)
| Halving | Block Range | Reward | Duration | DIL Mined | Cumulative % |
|---|---|---|---|---|---|
| 0 | 0 - 209,999 | 50 DIL | 1.60 years | 10,500,000 | 50.0% |
| 1 | 210k - 419,999 | 25 DIL | 1.60 years | 5,250,000 | 75.0% |
| 2 | 420k - 629,999 | 12.5 DIL | 1.60 years | 2,625,000 | 87.5% |
| 3 | 630k - 839,999 | 6.25 DIL | 1.60 years | 1,312,500 | 93.75% |
| 4+ | 840k+ | <6.25 DIL | continuing | ~1,312,500 | ~100% |
Comparison to Bitcoin: Dilithion's emission is exactly 2.5x faster than Bitcoin (matching the block time ratio of 4 min vs. 10 min). Same total supply (21M), same halving interval (210,000 blocks), but halvings occur every ~1.6 years instead of ~4 years.
Total Supply: 210,000,000 DilV (fixed cap) Initial Reward: 100 DilV per block Block Time: 45 seconds Halving: Every 1,050,000 blocks (~1.5 years)
| Halving | Reward | Duration | DilV Mined | Cumulative % |
|---|---|---|---|---|
| 0 | 100 DilV | ~1.5 years | 105,000,000 | 50.0% |
| 1 | 50 DilV | ~1.5 years | 52,500,000 | 75.0% |
| 2 | 25 DilV | ~1.5 years | 26,250,000 | 87.5% |
| 3 | 12.5 DilV | ~1.5 years | 13,125,000 | 93.75% |
DilV's faster block time (45s vs. 4min) and higher initial reward (100 vs. 50) are balanced by a proportionally larger halving interval (1,050,000 blocks vs. 210,000 blocks), resulting in a similar ~1.5 year halving cadence.
Both chains implement a 2% mining development contribution—not a premine, but an ongoing transparent allocation from block subsidies:
DIL Block Subsidy: 50 DIL (100%) ├── Miner Reward: 49 DIL (98%) ├── Dev Fund: 0.5 DIL (1%) └── Developer Reward: 0.5 DIL (1%) DilV Block Subsidy: 100 DilV (100%) ├── Miner Reward: 98 DilV (98%) ├── Dev Fund: 1.0 DilV (1%) └── Developer Reward: 1.0 DilV (1%)
Hardcoded Addresses:
All nodes validate that mined blocks include the correct development outputs at the correct amounts. Blocks without valid development outputs are rejected by the network.
Fee Model:
Fees remain negligible to encourage usage while providing spam protection. The fee market will evolve as adoption grows.
Dilithion includes a bridge to Base (Coinbase L2), allowing native DIL and DilV to be represented as ERC-20 tokens on Ethereum's L2 ecosystem.
The bridge uses a lock-and-mint / burn-and-release model:
mint() on the ERC-20 contract on Base, creating wrapped tokensburn() on the ERC-20 contract, specifying their native chain address| Property | wDIL | wDILV |
|---|---|---|
| Standard | ERC-20 | ERC-20 |
| Name | Wrapped DIL | Wrapped DilV |
| Symbol | wDIL | wDILV |
| Decimals | 8 | 8 |
| Replay Protection | Native txid tracking | Native txid tracking |
| Pausable | Yes (emergency stop) | Yes (emergency stop) |
Current: Custodial bridge operated by the development team. The bridge owner controls minting authority.
Safety features:
Upgrade path: Migrate minting authority to a 3-of-5 Gnosis Safe multisig for decentralized control.
Defenses: RandomX CPU mining means an attacker must acquire thousands of consumer CPUs. No ASIC shortcut exists. Combined with DFMP heat tracking, sustained dominance by a single identity triggers escalating penalties.
Risk Level: LOW (economically impractical)
Definition: Attacker creates many fake mining identities to circumvent DFMP fair mining limits.
Defenses:
Risk Level: LOW (Digital DNA makes Sybil identities detectable)
Defenses:
Risk Level: LOW (standard Bitcoin-style defenses)
Defense: Dilithion is quantum-safe by design:
Risk Level: NONE (primary design goal)
Dilithion has been under active development since late 2025, with rapid iteration on mainnet. All development is open-source on GitHub.
| Feature | Status | Description |
|---|---|---|
| Post-Quantum Core | Live | Dilithium3 signatures, SHA-3 hashing, RandomX mining |
| Fair Mining (DFMP) | Live | MIK identity, payout heat tracking, anti-whale penalties |
| ASERT Difficulty | Live | Per-block exponential difficulty adjustment |
| Timestamp Validation | Live | Hard fork at height 24,500 tightening timestamp rules |
| Digital DNA | Live | 8-dimension identity fingerprinting (advisory mode) |
| DilV Chain | Live | VDF-based companion chain with 45-second blocks |
| VDF Consensus | Live | Chia VDF library, lowest-output-wins distribution |
| Bridge to Base | Live | wDIL and wDILV ERC-20 tokens on Base L2 |
| DEX Liquidity | Live | Aerodrome pools for wDIL and wDILV |
| Web Wallet | Live | Browser-based wallet with DIL/DilV support |
| HTLC Scripts | Live (DilV) | Hash Time-Locked Contracts for atomic swaps |
| Price Page | Live | Real-time price data from Aerodrome + CoinGecko |
Near-term:
Medium-term:
Long-term:
| Feature | Bitcoin | Ethereum | Dilithion |
|---|---|---|---|
| Quantum-safe signatures | No | No | Yes (NIST standard) |
| ASIC-resistant mining | No | N/A (PoS) | Yes (RandomX) |
| Sybil defense | None | Economic (stake) | Digital DNA (physics-based) |
| Hardware-neutral chain | No | No | Yes (DilV/VDF) |
| Fair mining protocol | No | No | Yes (DFMP/MIK) |
| Fixed supply | Yes (21M) | No | Yes (21M DIL, 210M DilV) |
| L2 bridge | No native | Native | Yes (Base L2) |
Dilithion adheres to fair launch principles:
Dilithion aims to be the standard for quantum-safe cryptocurrency—a store of value and medium of exchange that remains secure as quantum computing advances. With dual-chain architecture, physics-based Sybil defense, and cross-chain interoperability, Dilithion is building a complete ecosystem for the post-quantum era.
Mission Statement:
"Secure digital currency for the quantum age, built by the community, for the community."
| Parameter | DIL | DilV |
|---|---|---|
| Consensus | RandomX Proof-of-Work | VDF (Lowest Output Wins) |
| Total Supply | 21,000,000 DIL | 210,000,000 DilV |
| Block Time | 240 seconds (4 minutes) | 45 seconds |
| Block Reward | 50 DIL (49 to miner) | 100 DilV (98 to miner) |
| Halving Interval | 210,000 blocks (~1.6 years) | 1,050,000 blocks (~1.5 years) |
| Max Block Size | 4 MB | 4 MB |
| Coinbase Maturity | 100 blocks | 6 blocks |
| Dev Contribution | 2% (1% fund + 1% reward) | 2% (1% fund + 1% reward) |
| Signature Algorithm | CRYSTALS-Dilithium3 (NIST FIPS 204) | |
| Hash Algorithm | SHA-3-256 (NIST FIPS 202) | |
| Smallest Unit | ion (10-8 DIL) | volt (10-8 DilV) |
| P2P Port | 8444 | 9444 |
| RPC Port | 8332 | 9332 |
| Digital DNA | Active (height 30,000) | Active (from genesis) |
| Difficulty | ASERT (per-block) | N/A (VDF distribution) |
| Network Magic | 0xD1714102 | 0xD17FD100 |
| Chain ID | 1 | 2 |
| Bridge Token | wDIL (ERC-20 on Base) | wDILV (ERC-20 on Base) |
Website: https://dilithion.org
GitHub: https://github.com/dilithion/dilithion
Discord: https://discord.gg/dilithion
Telegram: https://t.me/dilithion
Dilithion Whitepaper v2.0
March 2026
"Quantum-Safe. Community-Driven. Fair Launch."
Disclaimer: This whitepaper is for informational and educational purposes only and does not constitute investment, financial, or legal advice. Dilithion is EXPERIMENTAL software developed with AI assistance and has NOT been professionally audited. The software may contain bugs, vulnerabilities, or design flaws. Cryptocurrency investments carry significant risk, including total loss of funds. No guarantees are made regarding security, functionality, future value, adoption, or success. Use this software entirely at your own risk. Users are responsible for securing their own keys and funds. Always do your own research (DYOR) and consult with qualified professionals before participating in any cryptocurrency project.