# Explain what the requested budget will be used for?
* Detailed review and documentation of the analysis of cryptographic hashing and encryption algorithms used in cryptonote and other blockchain technologies to ascertain the fundamental principles and mathematical primitives
- - So far the list includes Rijndael (AES), SHA2, Graestl, Blake256, Chacga8, Keccack and more
+ - So far the list includes Rijndael (AES), SHA2, Graestl, Blake256, Chacga8, Keccak and more
- From Asymmetric Cryptography comes RSA, DSA, Diffie-Helmann
and Elliptic Curve
- From these it is clear that the primitives involve Matrix Multiply