Naoris Protocol Launches $120,000 Bounty to Challenge Cryptography Before Quantum Computers Take Over
WILMINGTON, DE, Aug 1, 2025 – The future of digital security is at a critical juncture as Naoris Protocol announces a groundbreaking initiative: a $120,000 bounty program aimed at cryptographers around the globe. Their mission? To break the elliptic curve algorithms that currently underpin our digital economy—including Bitcoin’s staggering $2.4 trillion market and the colossal $410 trillion banking system.
The Urgency of the Challenge
While the elegance of elliptic curve cryptography (ECC) has proven robust until now, the ticking clock of quantum computing presents a transformative threat. Experts project that within the next 10 to 20 years, quantum computers will be capable of cracking ECC, potentially paving the way for unprecedented financial crises. As David Carvalho, CEO of Naoris Protocol, aptly puts it, “This isn’t about attacking cryptocurrency, it’s about defending it.” The challenge necessitates a proactive approach to safeguard our digital future.
Unpacking the Bounty Structure
Naoris Protocol has structured the bounty to incentivize focused efforts on specific cryptographic algorithms:
- $50,000 for breaking secp256k1: This curve is pivotal for Bitcoin and Ethereum.
- $30,000 for breaking Ed25519: Used in prominent applications like Signal, WhatsApp, and Solana.
- $20,000 for breaking NIST P-256: Critical for TLS/SSL protocols and thereby, the very fabric of Internet security.
- $10,000 for breaking other major curves: These include P-224, P-384, and P-521.
The stakes are high, and the challenge is not for the faint-hearted. Participants need to demonstrate their abilities through legitimate mathematical cryptanalysis rather than exploiting implementation flaws or side-channel attacks.
The Stakes Are Tremendous
The consequences of a successful breach could be monumental, as elliptic curve algorithms currently secure:
- $410 trillion in global banking assets
- $145 trillion in assets under management
- $57 trillion in intellectual property
- $2.4 trillion in cryptocurrency
- Government communications and defense systems
- Every secure internet transaction
Essentially, these cryptographic frameworks support much of the world’s financial infrastructure. The reality of an imminent threat emphasizes the importance of this bounty challenge.
Understanding the Challenge
Participants are expected to recover a full private key from a public key using mathematical techniques. This rigorous requirement highlights the seriousness of the bounty—it’s not merely about finding a flaw in a system, but genuinely breaking the core mathematics that underpin ECC.
In Carvalho’s words, “When quantum computers achieve this in the next decade or two, it won’t be a drill.” The awareness around this challenge is not merely awareness; it is a call to action for those in the cryptography community.
Racing Against Time
Current quantum technology is still nascent, with existing quantum computers housing about 1,000 physical qubits. Yet, breaking 256-bit elliptic curve cryptography demands an estimated 2,330 logical qubits. This might seem like a significant gap, but the acceleration of quantum computing power is exponential. As industries watch closely, the pressure to innovate and transition to quantum-resistant measures only grows.
Carvalho also highlights an essential point: “The NSA announced in 2015 that they’re transitioning to quantum-resistant cryptography.” When the world’s leading cryptographic authority initiates such a shift, it signals a crucial trend that forward-thinking enterprises and governments must heed.
Naoris Protocol’s Vision
Naoris Protocol is not just reacting to a potential crisis; they are actively building a framework for the future. Their enterprise-grade blockchain infrastructure utilizes lattice-based cryptography, designed to withstand both classical and quantum attacks. With a client base that includes Fortune 500 companies and government agencies, Naoris aims to lead the charge into a post-quantum world.
Participation Details
Prospective participants can submit their entries via the designated BountyForm platform. This initiative represents a vital intersection of academia and industry, encouraging collaboration and innovation in the quest for more secure digital systems.
For those interested in being part of this groundbreaking challenge, submissions can be made directly through: BountyForm.
Media Contact: For further inquiries, reach out to Sharon at sharon@babslabs.io.