Closed 0xJepsen closed 2 months ago
Randomly came across this bounty on github feed but I couldn't find any info about bounty program at ronkathon. Is this open to public? asking because this looks interesting to work on!
Randomly came across this bounty on github feed but I couldn't find any info about bounty program at ronkathon. Is this open to public? asking because this looks interesting to work on!
We had created the bounty as a party of an event called zkhack. @devloper are we open to continuing the bounty?
Randomly came across this bounty on github feed but I couldn't find any info about bounty program at ronkathon. Is this open to public? asking because this looks interesting to work on!
We are working on a more general bounty process to reward contributors and hope to have some more information available soon
@mrdaybird -- we're opening up bounties for contributors! if you'd like to take a crack at this one, feel free to assign it to yourself and get started 😄
@brunny-eth Awesome! I would love to do this over the weekend. Please assign it to me if that's okay!
assigned to you ser @mrdaybird
@brunny-eth I think I have completed all the requirements for this bounty! (with PR #157 #158 and #159) We now have an implementation of GCM+GHASH, and an improved modes of operation readme. I hope that everything look good!
EDIT: added PR #159 along with others
sounds good -- standby, @mrdaybird, we will get back to you very shortly 🫡
Advanced Encryption Standard: Galois Counter Mode (AES-GCM)
AES-GCM is a block cipher mode of operation for the AES block cipher that is, specifically, counter mode. The effect is that the block cipher becomes a stream cipher.
CTR (Counter) mode: Provides confidentiality. GCM (Galois/Counter Mode): Provides both confidentiality and authentication. For Clarity AES-GCM depends is a specification depending upon the counter mode of operation of AES (AES-CTR) and thus counter mode support is required for the completion of this bounty. That being said Ronkathon already has an AES implementation that should be utilized for this so the AES algorithm doesn't need to be implemented.
Requirements
Resources
Criteria
For timely submissions of bounties that meet the implementation requirements, a bounty of at least $250 will be awarded to the contributor. Additional bounty amounts are available and will be rewarded based on the following criteria: