Crypto Daily
2025-07-31 18:29:26

Naoris Protocol Launches $120K Post-Quantum Bug Bounty Amid Growing Cryptographic Security Focus

Wilmington, Delaware, July 31st, 2025, Chainwire Naoris Protocol Launches $120K Bounty Program to Test Elliptic Curve Cryptography Resilience Naoris Protocol , the post-quantum infrastructure pioneer, today announced a $120,000 (1BTC at time of announcement) bounty program challenging cryptographers worldwide to break the elliptic curve algorithms that currently secure the global digital economy, from Bitcoin's $2.4 trillion market to the $410 trillion banking system. The challenge draws attention to concerns about the long-term resilience of current cryptographic standards, which experts believe could be compromised by advances in quantum computing over the next two decades. Bounty Structure — factual, but suggest slight adjustment to punctuation: $50,000 for breaking secp256k1 (Bitcoin and Ethereum) $30,000 for breaking Ed25519 (Signal, WhatsApp, Solana) $20,000 for breaking NIST P-256 (TLS/SSL, Internet security) $10,000 for other major curves (P-224, P-384, P-521) "This isn't about attacking cryptocurrency, it's about defending it," said David Carvalho, CEO of Naoris Protocol. "These curves are mathematical masterpieces that have protected global commerce for decades. But quantum computing will render them obsolete. We're building the quantum-safe infrastructure the world needs before that day arrives." What's at Stake Elliptic curve cryptography is a foundational element in securing a wide range of digital systems, including financial services, blockchain networks, intellectual property protection, and secure communications. It is widely used in: Global banking and asset management systems Cryptocurrency networks such as Bitcoin and Ethereum Encrypted messaging platforms and secure web protocols (TLS/SSL) Government and defense communications As these cryptographic standards face potential future threats from quantum computing, testing their resilience has become a growing focus for both public and private sector stakeholders. The Challenge Participants must demonstrate the ability to recover a full private key from a public key using mathematical cryptanalysis. Implementation flaws, side-channel attacks, or weak random number generators don't qualify; this is about breaking the math itself. Submissions can be made at: BountyForm "When quantum computers achieve this in the next decade or two, it won't be a drill," Carvalho warned. "That's why forward-thinking enterprises and governments are transitioning to post-quantum cryptography now." Racing Against Time Current quantum computers have approximately 1,000 physical qubits. Breaking 256-bit elliptic curve cryptography requires an estimated 2,330 logical qubits. Although that gap may seem large, quantum computing is advancing at an exponential rate. "The NSA announced in 2015 they're transitioning to quantum-resistant cryptography," noted Carvalho. "When the world's premier cryptographic authority moves, smart organizations follow." About Naoris Protocol Naoris Protocol is building enterprise-grade, quantum-resistant blockchain infrastructure using lattice-based cryptography that withstands both classical and quantum attacks. The company serves Fortune 500 enterprises and government agencies, preparing for the post-quantum era. Users can submit entries here: BountyForm ContactBabs Press OfficeBabs Labssharon@babslabs.io Disclaimer: This is a sponsored press release and is for informational purposes only. It does not reflect the views of Crypto Daily, nor is it intended to be used as legal, tax, investment, or financial advice.

Get Crypto Newsletter
Read the Disclaimer : All content provided herein our website, hyperlinked sites, associated applications, forums, blogs, social media accounts and other platforms (“Site”) is for your general information only, procured from third party sources. We make no warranties of any kind in relation to our content, including but not limited to accuracy and updatedness. No part of the content that we provide constitutes financial advice, legal advice or any other form of advice meant for your specific reliance for any purpose. Any use or reliance on our content is solely at your own risk and discretion. You should conduct your own research, review, analyse and verify our content before relying on them. Trading is a highly risky activity that can lead to major losses, please therefore consult your financial advisor before making any decision. No content on our Site is meant to be a solicitation or offer.