ZK Hash Function Cryptanalysis Bounties
Terms
Task: find such that
where is the inner sponge permutation (bijective mapping) of the hash function the challenge list.
- Solutions should be sent to Dmitry Khovratovich before November 30th 2022.
- First come first win.
- Within 1 month after the submission the authors should provide a technical report with the attack description, which should be released to the public domain at latest December 1st 2022. The code should be also made public before this date.
- Total Bounty Budget: $200,000 USD.
- Parameters are fixed on November 23rd 2021.
Rescue Prime
- Number of rounds:
- Brute force attack complexity:
We expect that a variant with bits of security to withstand attacks of complexity up to time (function calls) and memory.
Reference implementation and bounty instances.
| Category | Parameters | Security Level (bits) | Bounty |
|---|---|---|---|
| Easy | 25 | $4,000 | |
| Medium | 29 | $6,000 | |
| Hard | 30 | $12,000 | |
| Hard | 33 | $26,000 |
Feistel-MIMC
- Task: find such that
- Number of rounds:
- Brute force attack complexity:
We expect that a variant with bits of security to withstand attacks of complexity up to time (function calls) and memory.
The initial parameters were broken and were replaced.
Reference implementation and bounty instances.
| Category | Parameters | Security Level (bits) | Bounty |
|---|---|---|---|
| Easy | 25 | $4,000 | |
| Medium | 29 | $6,000 | |
| Hard | 30 | $12,000 | |
| Hard | 33 | $26,000 |
Poseidon
- Number of full rounds:
- Number of partial rounds varies (see below)
- Brute force attack complexity:
We expect that a variant with bits of security to withstand attacks of complexity up to time (function calls) and memory.
The initial parameters were broken and were replaced.
Reference implementation and bounty instances.
| Category | Parameters | Security Level (bits) | Bounty |
|---|---|---|---|
| Hard | 32 | $12,000 | |
| Hard | 40 | $26,000 |
Reinforced Concrete
- Number of layers as in the original design
- Different prime field
- The best attack we have found for these variants is exhaustive search.
- Groebner basis challenges might be declared additionally.
We expect that a variant with bits of security to withstand attacks of complexity up to time (function calls) and memory.
Decomposition and alpha/beta values.
Reference implementation and bounty instances.
| Category | Parameters | Security Level (bits) | Bounty |
|---|---|---|---|
| Easy | 24 | $4,000 | |
| Hard | 28 | $6,000 | |
| Hard | 32 | $12,000 |