okx app

OKX app offers multilingual support, copy trading, and API solutions for global traders. New users enjoy exclusive fee discounts!

Download for Android Download for IOS

Naoris Offers $120K Bounty to Crack Bitcoin's Quantum Vulnerability

Time :2025-08-01 03:35:35   key word: quantum computing, Bitcoin encryption, cryptography bounty, blockchain security,

Cybersecurity Firm Challenges Researchers to Break Core Crypto Algorithms

Naoris Protocol has launched an ambitious $120,000 bounty program targeting the cryptographic foundations of major blockchain networks. The cybersecurity company announced on July 31 that it will reward researchers who successfully compromise the encryption standards securing Bitcoin, Ethereum, and Solana.

Breaking the Unbreakable: The Million-Dollar Math Problem

The bounty structure offers 【$50,000】 for cracking secp256k1 — the elliptic curve algorithm protecting Bitcoin and Ethereum transactions. Another 【$30,000】 awaits those who break Ed25519, used by Solana and encrypted messaging platforms. Smaller rewards target NIST-standard curves including P-256 (【$20,000】) and legacy systems like P-224 (【$10,000】).

——"This isn't about undermining crypto, but stress-testing its defenses before quantum computers can,"—— a Naoris spokesperson told Cointelegraph. Current estimates suggest brute-forcing secp256k1 would require 10 billion trillion years with conventional computing.

The Quantum Countdown Has Begun

While functional quantum computers capable of breaking 256-bit encryption remain years away, the crypto industry is already preparing defenses. Bitcoin developers recently proposed a post-quantum migration plan through BIP-XXXX, while Sui Network unveiled a quantum-resistant wallet framework.

Blockstream CEO Adam Back noted the existential stakes: ——"A successful attack would force Satoshi's coins to move, potentially revealing whether the anonymous creator still controls them."—— The bounty program coincides with growing institutional warnings about quantum risks to financial infrastructure.

Beyond Crypto: The Web's Fragile Foundation

Successful attacks would have cascading effects across digital infrastructure:

• TLS encryption protecting web traffic (NIST P-256)
• Secure shell protocols for server access (Ed25519)
• DNS security extensions and legacy smartcards (P-224)

Naoris emphasizes submissions must demonstrate practical attacks rather than theoretical vulnerabilities. The program runs through Q4 2025, with results informing next-generation quantum-resistant protocols.