Cryptocurrency Prices by Coinlib

Naoris Protocol Launches $120K Submit-Quantum Bug Bounty Amid Rising Cryptographic Safety Focus
Wilmington, Delaware, July thirty first, 2025, ChainwireNaoris Protocol Launches $120K Bounty Program to Take a look at Elliptic Curve Cryptography ResilienceNaoris Protocol, the post-quantum infrastructure pioneer, in the present day introduced a $120,000 (1BTC at time of announcement) bounty program difficult cryptographers worldwide to interrupt the elliptic curve algorithms that at the moment safe the worldwide digital economic system, from Bitcoin's $2.4 trillion market to the $410 trillion banking system.The problem attracts consideration to considerations in regards to the long-term resilience of present cryptographic requirements, which consultants imagine might be compromised by advances in quantum computing over the following twenty years.Bounty Construction — factual, however recommend slight adjustment to punctuation:$50,000 for breaking secp256k1 (Bitcoin and Ethereum)$30,000 for breaking Ed25519 (Sign, WhatsApp, Solana)$20,000 for breaking NIST P-256 (TLS/SSL, Web safety)$10,000 for different main curves (P-224, P-384, P-521)”This is not about attacking cryptocurrency, it is about defending it,” mentioned David Carvalho, CEO of Naoris Protocol. “These curves are mathematical masterpieces which have protected international commerce for many years. However quantum computing will render them out of date. We're constructing the quantum-safe infrastructure the world wants earlier than that day arrives.”What's at StakeElliptic curve cryptography is a foundational ingredient in securing a variety of digital methods, together with monetary providers, blockchain networks, mental property safety, and safe communications. It's broadly utilized in:World banking and asset administration systemsCryptocurrency networks reminiscent of Bitcoin and EthereumEncrypted messaging platforms and safe internet protocols (TLS/SSL)Authorities and protection communicationsAs these cryptographic requirements face potential future threats from quantum computing, testing their resilience has grow to be a rising focus for each private and non-private sector stakeholders.The ChallengeParticipants should show the flexibility to get better a full non-public key from a public key utilizing mathematical cryptanalysis. Implementation flaws, side-channel assaults, or weak random quantity turbines do not qualify; that is about breaking the mathematics itself. Submissions might be made at: BountyForm”When quantum computer systems obtain this within the subsequent decade or two, it will not be a drill,” Carvalho warned. “That is why forward-thinking enterprises and governments are transitioning to post-quantum cryptography now.”Racing Towards TimeCurrent quantum computer systems have roughly 1,000 bodily qubits. Breaking 256-bit elliptic curve cryptography requires an estimated 2,330 logical qubits. Though that hole could appear massive, quantum computing is advancing at an exponential price.”The NSA introduced in 2015 they're transitioning to quantum-resistant cryptography,” famous Carvalho. “When the world's premier cryptographic authority strikes, good organizations comply with.”About Naoris ProtocolNaoris Protocol is constructing enterprise-grade, quantum-resistant blockchain infrastructure utilizing lattice-based cryptography that withstands each classical and quantum assaults. The corporate serves Fortune 500 enterprises and authorities companies, making ready for the post-quantum period.Customers can submit entries right here: BountyFormContactBabs Press OfficeBabs Labs[email protected]Disclaimer: This can be a sponsored press launch and is for informational functions solely. It doesn't mirror the views of Crypto Day by day, neither is it supposed for use as authorized, tax, funding, or monetary recommendation.