[PRESS RELEASE – Wilmington, Delaware, July 31st, 2025]
Naoris Protocol Launches $120K Bounty Program to Take a look at Elliptic Curve Cryptography Resilience
Naoris Protocol, the post-quantum infrastructure pioneer, in the present day introduced a $120,000 (1BTC at time of announcement) bounty program difficult cryptographers worldwide to interrupt the elliptic curve algorithms that at the moment safe the worldwide digital economic system, from Bitcoin’s $2.4 trillion market to the $410 trillion banking system.
The problem attracts consideration to considerations in regards to the long-term resilience of present cryptographic requirements, which consultants imagine could possibly be compromised by advances in quantum computing over the subsequent twenty years.
Bounty Construction — factual, however recommend slight adjustment to punctuation:
- $50,000 for breaking secp256k1 (Bitcoin and Ethereum)
- $30,000 for breaking Ed25519 (Sign, WhatsApp, Solana)
- $20,000 for breaking NIST P-256 (TLS/SSL, Web safety)
- $10,000 for different main curves (P-224, P-384, P-521)
“This isn’t about attacking cryptocurrency, it’s about defending it,” stated David Carvalho, CEO of Naoris Protocol. “These curves are mathematical masterpieces which have protected international commerce for many years. However quantum computing will render them out of date. We’re constructing the quantum-safe infrastructure the world wants earlier than that day arrives.”
What’s at Stake
Elliptic curve cryptography is a foundational aspect in securing a variety of digital programs, together with monetary companies, blockchain networks, mental property safety, and safe communications. It’s broadly utilized in:
- International banking and asset administration programs
- Cryptocurrency networks similar to Bitcoin and Ethereum
- Encrypted messaging platforms and safe internet protocols (TLS/SSL)
- Authorities and protection communications
- As these cryptographic requirements face potential future threats from quantum computing, testing their resilience has change into a rising focus for each private and non-private sector stakeholders.
The Problem
Contributors should reveal the flexibility to recuperate a full non-public key from a public key utilizing mathematical cryptanalysis. Implementation flaws, side-channel assaults, or weak random quantity mills don’t qualify; that is about breaking the mathematics itself.
Submissions could be made at: BountyForm
“When quantum computer systems obtain this within the subsequent decade or two, it received’t be a drill,” Carvalho warned. “That’s why forward-thinking enterprises and governments are transitioning to post-quantum cryptography now.”
Racing Towards Time
Present quantum computer systems have roughly 1,000 bodily qubits. Breaking 256-bit elliptic curve cryptography requires an estimated 2,330 logical qubits. Though that hole could appear massive, quantum computing is advancing at an exponential charge.
“The NSA introduced in 2015 they’re transitioning to quantum-resistant cryptography,” famous Carvalho. “When the world’s premier cryptographic authority strikes, good organizations comply with.”
About Naoris Protocol
Naoris Protocol is constructing enterprise-grade, quantum-resistant blockchain infrastructure utilizing lattice-based cryptography that withstands each classical and quantum assaults. The corporate serves Fortune 500 enterprises and authorities businesses, getting ready for the post-quantum period.
Customers can submit entries right here: BountyForm
Binance Free $600 (CryptoPotato Unique): Use this link to register a brand new account and obtain $600 unique welcome provide on Binance (full details).
LIMITED OFFER for CryptoPotato readers at Bybit: Use this link to register and open a $500 FREE place on any coin!
