
{"id":85498,"date":"2025-08-01T05:26:59","date_gmt":"2025-08-01T05:26:59","guid":{"rendered":"https:\/\/mycryptomania.com\/?p=85498"},"modified":"2025-08-01T05:26:59","modified_gmt":"2025-08-01T05:26:59","slug":"naoris-protocol-launches-120k-post-quantum-bug-bounty-amid-growing-cryptographic-security-focus","status":"publish","type":"post","link":"https:\/\/mycryptomania.com\/?p=85498","title":{"rendered":"Naoris Protocol Launches $120K Post-Quantum Bug Bounty Amid Growing Cryptographic Security Focus"},"content":{"rendered":"<p class=\"sc-jegxcv powTK\"><strong>[PRESS RELEASE \u2013 Wilmington, Delaware, July 31st, 2025]<\/strong><\/p>\n<p><strong>Naoris Protocol Launches $120K Bounty Program to Test Elliptic Curve Cryptography Resilience<\/strong><\/p>\n<p><a href=\"https:\/\/www.naorisprotocol.com\/\" target=\"_blank\" rel=\"noopener\">Naoris Protocol<\/a>, the post-quantum infrastructure pioneer, today announced a $120,000 (1BTC at time of announcement) bounty program challenging cryptographers worldwide to break the elliptic curve algorithms that currently secure the global digital economy, from Bitcoin\u2019s $2.4 trillion market to the $410 trillion banking system.<\/p>\n<p>The challenge draws attention to concerns about the long-term resilience of current cryptographic standards, which experts believe could be compromised by advances in quantum computing over the next two decades.<\/p>\n<p><strong>Bounty Structure<\/strong> \u2014 factual, but suggest slight adjustment to punctuation:<\/p>\n<p>$50,000 for breaking secp256k1 (Bitcoin and Ethereum)<br \/>\n$30,000 for breaking Ed25519 (Signal, WhatsApp, Solana)<br \/>\n$20,000 for breaking NIST P-256 (TLS\/SSL, Internet security)<br \/>\n$10,000 for other major curves (P-224, P-384, P-521)<\/p>\n<p>\u201cThis isn\u2019t about attacking cryptocurrency, it\u2019s about defending it,\u201d said David Carvalho, CEO of Naoris Protocol. \u201cThese curves are mathematical masterpieces that have protected global commerce for decades. But quantum computing will render them obsolete. We\u2019re building the quantum-safe infrastructure the world needs before that day arrives.\u201d<\/p>\n<p><strong>What\u2019s at Stake<\/strong><\/p>\n<p>Elliptic curve cryptography is a foundational element in securing a wide range of digital systems, including financial services, blockchain networks, intellectual property protection, and secure communications. It is widely used in:<\/p>\n<p>Global banking and asset management systems<br \/>\nCryptocurrency networks such as Bitcoin and Ethereum<br \/>\nEncrypted messaging platforms and secure web protocols (TLS\/SSL)<br \/>\nGovernment and defense communications<br \/>\nAs these cryptographic standards face potential future threats from quantum computing, testing their resilience has become a growing focus for both public and private sector stakeholders.<\/p>\n<p><strong>The Challenge<\/strong><\/p>\n<p>Participants must demonstrate the ability to recover a full private key from a public key using mathematical cryptanalysis. Implementation flaws, side-channel attacks, or weak random number generators don\u2019t qualify; this is about breaking the math itself.<\/p>\n<p><strong>Submissions can be made at: <\/strong><a href=\"https:\/\/admin.typeform.com\/form\/alXRRZQ4\/share\" target=\"_blank\" rel=\"noopener\"><strong>BountyForm<\/strong><\/a><\/p>\n<p>\u201cWhen quantum computers achieve this in the next decade or two, it won\u2019t be a drill,\u201d Carvalho warned. \u201cThat\u2019s why forward-thinking enterprises and governments are transitioning to post-quantum cryptography now.\u201d<\/p>\n<p><strong>Racing Against Time<\/strong><\/p>\n<p>Current quantum computers have approximately 1,000 physical qubits. Breaking 256-bit elliptic curve cryptography requires an estimated 2,330 logical qubits. Although that gap may seem large, quantum computing is advancing at an exponential rate.<\/p>\n<p>\u201cThe NSA announced in 2015 they\u2019re transitioning to quantum-resistant cryptography,\u201d noted Carvalho. \u201cWhen the world\u2019s premier cryptographic authority moves, smart organizations follow.\u201d<\/p>\n<p><strong>About Naoris Protocol<\/strong><\/p>\n<p><a href=\"https:\/\/www.naorisprotocol.com\/\" target=\"_blank\" rel=\"noopener\">Naoris Protocol<\/a> is building enterprise-grade, quantum-resistant blockchain infrastructure using lattice-based cryptography that withstands both classical and quantum attacks. The company serves Fortune 500 enterprises and government agencies, preparing for the post-quantum era.<\/p>\n<p><strong>Users can submit entries here: <\/strong><a href=\"https:\/\/admin.typeform.com\/form\/alXRRZQ4\/share\" target=\"_blank\" rel=\"noopener\"><strong>BountyForm<\/strong><\/a><\/p>\n<p>The post <a href=\"https:\/\/cryptopotato.com\/naoris-protocol-launches-120k-post-quantum-bug-bounty-amid-growing-cryptographic-security-focus\/\">Naoris Protocol Launches $120K Post-Quantum Bug Bounty Amid Growing Cryptographic Security Focus<\/a> appeared first on <a href=\"https:\/\/cryptopotato.com\/\">CryptoPotato<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>[PRESS RELEASE \u2013 Wilmington, Delaware, July 31st, 2025] Naoris Protocol Launches $120K Bounty Program to Test Elliptic Curve Cryptography Resilience Naoris Protocol, the post-quantum infrastructure pioneer, today announced a $120,000 (1BTC at time of announcement) bounty program challenging cryptographers worldwide to break the elliptic curve algorithms that currently secure the global digital economy, from Bitcoin\u2019s [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":85499,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-85498","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-discovery"],"_links":{"self":[{"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/posts\/85498"}],"collection":[{"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=85498"}],"version-history":[{"count":0,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/posts\/85498\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/media\/85499"}],"wp:attachment":[{"href":"https:\/\/mycryptomania.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=85498"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=85498"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=85498"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}