ZK Hash Function Cryptanalysis Bounties
Terms
Task: find such that
where is the inner sponge permutation (bijective mapping) of the hash function the challenge list.
- Solutions should be sent to Dmitry Khovratovich before November 30th 2022.
- First come first win.
- Within 1 month after the submission the authors should provide a technical report with the attack description, which should be released to the public domain at latest December 1st 2022. The code should be also made public before this date.
- Total Bounty Budget: $200,000 USD.
- Parameters are fixed on November 23rd 2021.
Rescue Prime
- Number of rounds:
- Brute force attack complexity:
We expect that a variant with bits of security to withstand attacks of complexity up to time (function calls) and memory.
Reference implementation and bounty instances.
Category | Parameters | Security Level (bits) | Bounty |
---|---|---|---|
Easy | 25 | $4,000 | |
Medium | 29 | $6,000 | |
Hard | 30 | $12,000 | |
Hard | 33 | $26,000 |
Feistel-MIMC
- Task: find such that
- Number of rounds:
- Brute force attack complexity:
We expect that a variant with bits of security to withstand attacks of complexity up to time (function calls) and memory.
The initial parameters were broken and were replaced.
Reference implementation and bounty instances.
Category | Parameters | Security Level (bits) | Bounty |
---|---|---|---|
Easy | 25 | $4,000 | |
Medium | 29 | $6,000 | |
Hard | 30 | $12,000 | |
Hard | 33 | $26,000 |
Poseidon
- Number of full rounds:
- Number of partial rounds varies (see below)
- Brute force attack complexity:
We expect that a variant with bits of security to withstand attacks of complexity up to time (function calls) and memory.
The initial parameters were broken and were replaced.
Reference implementation and bounty instances.
Category | Parameters | Security Level (bits) | Bounty |
---|---|---|---|
Hard | 32 | $12,000 | |
Hard | 40 | $26,000 |
Reinforced Concrete
- Number of layers as in the original design
- Different prime field
- The best attack we have found for these variants is exhaustive search.
- Groebner basis challenges might be declared additionally.
We expect that a variant with bits of security to withstand attacks of complexity up to time (function calls) and memory.
Decomposition and alpha/beta values.
Reference implementation and bounty instances.
Category | Parameters | Security Level (bits) | Bounty |
---|---|---|---|
Easy | 24 | $4,000 | |
Hard | 28 | $6,000 | |
Hard | 32 | $12,000 |