{"id":17375,"date":"2026-02-18T01:36:44","date_gmt":"2026-02-18T01:36:44","guid":{"rendered":"https:\/\/cryptoted.net\/index.php\/2026\/02\/18\/shipping-an-l1-zkevm-2-the-security-foundations\/"},"modified":"2026-02-18T01:36:44","modified_gmt":"2026-02-18T01:36:44","slug":"shipping-an-l1-zkevm-2-the-security-foundations","status":"publish","type":"post","link":"https:\/\/cryptoted.net\/index.php\/2026\/02\/18\/shipping-an-l1-zkevm-2-the-security-foundations\/","title":{"rendered":"Shipping an L1 zkEVM #2: The Security Foundations"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div id=\"\">\n<p class=\"chakra-text css-gi02ar\"><em class=\"chakra-text css-0\">Thanks to Arantxa Zapico, Benedikt Wagner, and Dmitry Khovratovich from the EF cryptography team for their contributions, and to Ladislaus, Kev, Alex, and Marius for the careful review and feedback.<\/em><\/p>\n<hr aria-orientation=\"horizontal\" class=\"chakra-divider css-1e6gg7n\"\/>\n<p class=\"chakra-text css-gi02ar\">The zkEVM ecosystem has been sprinting for a year. And it worked! We crossed the finish line for real-time proving!<\/p>\n<p class=\"chakra-text css-gi02ar\">Now comes the next phase: building something mainnet-grade.<\/p>\n<h2 class=\"chakra-heading group css-1kpzc4q\" id=\"from-speed-to-security\" data-group=\"true\"><a class=\"chakra-link css-128fqrf\" aria-label=\"from speed to security permalink\" href=\"#from-speed-to-security\"><svg viewbox=\"0 0 24 24\" focusable=\"false\" class=\"chakra-icon css-173jpr1\"><g fill=\"currentColor\"><path d=\"M10.458,18.374,7.721,21.11a2.853,2.853,0,0,1-3.942,0l-.892-.891a2.787,2.787,0,0,1,0-3.941l5.8-5.8a2.789,2.789,0,0,1,3.942,0l.893.892A1,1,0,0,0,14.94,9.952l-.893-.892a4.791,4.791,0,0,0-6.771,0l-5.8,5.8a4.787,4.787,0,0,0,0,6.77l.892.891a4.785,4.785,0,0,0,6.771,0l2.736-2.735a1,1,0,1,0-1.414-1.415Z\"\/><path d=\"M22.526,2.363l-.892-.892a4.8,4.8,0,0,0-6.77,0l-2.905,2.9a1,1,0,0,0,1.414,1.414l2.9-2.9a2.79,2.79,0,0,1,3.941,0l.893.893a2.786,2.786,0,0,1,0,3.942l-5.8,5.8a2.769,2.769,0,0,1-1.971.817h0a2.766,2.766,0,0,1-1.969-.816,1,1,0,1,0-1.415,1.412,4.751,4.751,0,0,0,3.384,1.4h0a4.752,4.752,0,0,0,3.385-1.4l5.8-5.8a4.786,4.786,0,0,0,0-6.771Z\"\/><\/g><\/svg><\/a>From speed to security<\/h2>\n<p class=\"chakra-text css-gi02ar\">In July, <a class=\"chakra-link css-vezwxf\" href=\"https:\/\/blog.ethereum.org\/2025\/07\/10\/realtime-proving\">we published a north-star definition<\/a> for realtime proving. Nine months later, the <a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-vezwxf\" href=\"https:\/\/ethproofs.org\/blog\/ethproofs-2025-review-2026-roadmap\">ecosystem crushed it<\/a>: proving latency dropped from 16 minutes to 16 seconds, costs collapsed 45\u00d7, and zkVMs now prove 99% of all Ethereum blocks in under 10 seconds on target hardware.<\/p>\n<p class=\"chakra-text css-gi02ar\">While the major performance bottlenecks have been cleared by the zkEVM teams, security still remains the elephant in the room.<\/p>\n<h2 class=\"chakra-heading group css-1kpzc4q\" id=\"the-case-for-128-bit-provable-security\" data-group=\"true\"><a class=\"chakra-link css-128fqrf\" aria-label=\"the case for 128 bit provable security permalink\" href=\"#the-case-for-128-bit-provable-security\"><svg viewbox=\"0 0 24 24\" focusable=\"false\" class=\"chakra-icon css-173jpr1\"><g fill=\"currentColor\"><path d=\"M10.458,18.374,7.721,21.11a2.853,2.853,0,0,1-3.942,0l-.892-.891a2.787,2.787,0,0,1,0-3.941l5.8-5.8a2.789,2.789,0,0,1,3.942,0l.893.892A1,1,0,0,0,14.94,9.952l-.893-.892a4.791,4.791,0,0,0-6.771,0l-5.8,5.8a4.787,4.787,0,0,0,0,6.77l.892.891a4.785,4.785,0,0,0,6.771,0l2.736-2.735a1,1,0,1,0-1.414-1.415Z\"\/><path d=\"M22.526,2.363l-.892-.892a4.8,4.8,0,0,0-6.77,0l-2.905,2.9a1,1,0,0,0,1.414,1.414l2.9-2.9a2.79,2.79,0,0,1,3.941,0l.893.893a2.786,2.786,0,0,1,0,3.942l-5.8,5.8a2.769,2.769,0,0,1-1.971.817h0a2.766,2.766,0,0,1-1.969-.816,1,1,0,1,0-1.415,1.412,4.751,4.751,0,0,0,3.384,1.4h0a4.752,4.752,0,0,0,3.385-1.4l5.8-5.8a4.786,4.786,0,0,0,0-6.771Z\"\/><\/g><\/svg><\/a>The case for 128-bit provable security<\/h2>\n<p class=\"chakra-text css-gi02ar\">Many STARK-based zkEVMs today rely on unproven mathematical conjectures to hit their security targets. Over the past months, STARK security has <a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-vezwxf\" href=\"https:\/\/www.youtube.com\/watch?v=9zw5jOMB9UY\">been going through a lot<\/a>, with foundational conjectures getting mathematically <a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-vezwxf\" href=\"https:\/\/blog.zksecurity.xyz\/posts\/proximity-conjecture\/\">disproven<\/a> by researchers. Each conjecture that falls takes bits of security with it: what was advertised as 100 bits might actually be 80.<\/p>\n<p class=\"chakra-text css-gi02ar\">The only reasonable <a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-vezwxf\" href=\"https:\/\/youtu.be\/sKXGt5X6Vm8?si=7LmRsxBdNpt8fr-B\">path forward<\/a> is <em class=\"chakra-text css-0\">provable security<\/em>, and 128 bits remains the <a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-vezwxf\" href=\"https:\/\/en.wikipedia.org\/wiki\/Security_level\">target<\/a>. It&#8217;s the security level <a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-vezwxf\" href=\"https:\/\/doi.org\/10.6028\/NIST.SP.800-57pt1r5\">recommended by standardization bodies<\/a> and validated by real-world <a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-vezwxf\" href=\"https:\/\/x.com\/VitalikButerin\/status\/1996954146604204363\">computational milestones<\/a>.<\/p>\n<p class=\"chakra-text css-gi02ar\">For zkEVMs, this isn&#8217;t academic. A soundness issue is not like other security issues. If an attacker can forge a proof, they can forge anything: mint tokens from nothing, rewrite state, steal funds. For an L1 zkEVM securing hundreds of billions of dollars, the security margin is not negotiable.<\/p>\n<h2 class=\"chakra-heading group css-1kpzc4q\" id=\"three-milestones\" data-group=\"true\"><a class=\"chakra-link css-128fqrf\" aria-label=\"three milestones permalink\" href=\"#three-milestones\"><svg viewbox=\"0 0 24 24\" focusable=\"false\" class=\"chakra-icon css-173jpr1\"><g fill=\"currentColor\"><path d=\"M10.458,18.374,7.721,21.11a2.853,2.853,0,0,1-3.942,0l-.892-.891a2.787,2.787,0,0,1,0-3.941l5.8-5.8a2.789,2.789,0,0,1,3.942,0l.893.892A1,1,0,0,0,14.94,9.952l-.893-.892a4.791,4.791,0,0,0-6.771,0l-5.8,5.8a4.787,4.787,0,0,0,0,6.77l.892.891a4.785,4.785,0,0,0,6.771,0l2.736-2.735a1,1,0,1,0-1.414-1.415Z\"\/><path d=\"M22.526,2.363l-.892-.892a4.8,4.8,0,0,0-6.77,0l-2.905,2.9a1,1,0,0,0,1.414,1.414l2.9-2.9a2.79,2.79,0,0,1,3.941,0l.893.893a2.786,2.786,0,0,1,0,3.942l-5.8,5.8a2.769,2.769,0,0,1-1.971.817h0a2.766,2.766,0,0,1-1.969-.816,1,1,0,1,0-1.415,1.412,4.751,4.751,0,0,0,3.384,1.4h0a4.752,4.752,0,0,0,3.385-1.4l5.8-5.8a4.786,4.786,0,0,0,0-6.771Z\"\/><\/g><\/svg><\/a>Three Milestones<\/h2>\n<p class=\"chakra-text css-gi02ar\">For us, security and proof size are both critical\u2014but they&#8217;re also in tension. More security typically means larger proofs, and proofs must stay small enough to propagate across Ethereum&#8217;s P2P network reliably and in time.<\/p>\n<p class=\"chakra-text css-gi02ar\">We are setting three milestones:<\/p>\n<p class=\"chakra-text css-gi02ar\"><strong>Milestone 1: soundcalc integration<\/strong> <em class=\"chakra-text css-0\">Deadline: End of February 2026<\/em><\/p>\n<p class=\"chakra-text css-gi02ar\">To measure security consistently, we created <a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-vezwxf\" href=\"https:\/\/github.com\/ethereum\/soundcalc\/\">soundcalc<\/a>: a tool that estimates zkVM security based on the latest cryptographic security bounds and proof system parameters. It&#8217;s a living tool and we plan to keep integrating the latest research and known attacks.<\/p>\n<p class=\"chakra-text css-gi02ar\">By this deadline, participating zkEVM teams should have their proof system components and all of their circuits integrated with soundcalc. This gives us a common ground for the security assessments that follow. (For reference, see examples of previous integrations: <a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-vezwxf\" href=\"https:\/\/github.com\/ethereum\/soundcalc\/issues\/18\">#1<\/a>, <a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-vezwxf\" href=\"https:\/\/github.com\/ethereum\/soundcalc\/pull\/21\">#2<\/a>)<\/p>\n<p class=\"chakra-text css-gi02ar\"><strong>Milestone 2: Glamsterdam<\/strong> <em class=\"chakra-text css-0\">Deadline: End of May 2026<\/em><\/p>\n<ul role=\"list\" class=\"css-1ars4k6\">\n<li class=\"css-0\">100-bit provable security (as estimated by soundcalc)<\/li>\n<li class=\"css-0\">Final proof size \u2264 600 KiB<\/li>\n<li class=\"css-0\">Compact description of recursion architecture and sketch of its soundness<\/li>\n<\/ul>\n<p class=\"chakra-text css-gi02ar\"><strong>Milestone 3: H-star<\/strong> <em class=\"chakra-text css-0\">Deadline: End of 2026<\/em><\/p>\n<ul role=\"list\" class=\"css-1ars4k6\">\n<li class=\"css-0\">128-bit provable security (as estimated by soundcalc)<\/li>\n<li class=\"css-0\">Final proof size \u2264 300 KiB<\/li>\n<li class=\"css-0\">Formal security argument for the soundness of the recursion architecture<\/li>\n<\/ul>\n<p class=\"chakra-text css-gi02ar\">Recent cryptographic and engineering advances make hitting the above milestones tractable: compact polynomial commitment schemes like <a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-vezwxf\" href=\"https:\/\/eprint.iacr.org\/2024\/1586.pdf\">WHIR<\/a>, techniques like <a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-vezwxf\" href=\"https:\/\/eprint.iacr.org\/2025\/917\">JaggedPCS<\/a>, a bit of <a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-vezwxf\" href=\"https:\/\/eprint.iacr.org\/2021\/582.pdf#page=47\">grinding<\/a>, and a well-structured <a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-vezwxf\" href=\"https:\/\/github.com\/ethereum\/soundcalc\/blob\/084aaf054f56a9a74714461ac2659abdfb5c184e\/soundcalc\/zkvms\/pico\/pico.toml#L3-L19\">recursion topology<\/a> can all contribute to a viable path forward.<\/p>\n<p class=\"chakra-text css-gi02ar\">Recursion is particularly worth highlighting. Modern zkEVMs involve many circuits composed with recursion in custom ways, with lots of glue in between. Each team does it differently. Documenting this architecture and its soundness is essential for the security of the entire system.<\/p>\n<h2 class=\"chakra-heading group css-1kpzc4q\" id=\"the-path-forward\" data-group=\"true\"><a class=\"chakra-link css-128fqrf\" aria-label=\"the path forward permalink\" href=\"#the-path-forward\"><svg viewbox=\"0 0 24 24\" focusable=\"false\" class=\"chakra-icon css-173jpr1\"><g fill=\"currentColor\"><path d=\"M10.458,18.374,7.721,21.11a2.853,2.853,0,0,1-3.942,0l-.892-.891a2.787,2.787,0,0,1,0-3.941l5.8-5.8a2.789,2.789,0,0,1,3.942,0l.893.892A1,1,0,0,0,14.94,9.952l-.893-.892a4.791,4.791,0,0,0-6.771,0l-5.8,5.8a4.787,4.787,0,0,0,0,6.77l.892.891a4.785,4.785,0,0,0,6.771,0l2.736-2.735a1,1,0,1,0-1.414-1.415Z\"\/><path d=\"M22.526,2.363l-.892-.892a4.8,4.8,0,0,0-6.77,0l-2.905,2.9a1,1,0,0,0,1.414,1.414l2.9-2.9a2.79,2.79,0,0,1,3.941,0l.893.893a2.786,2.786,0,0,1,0,3.942l-5.8,5.8a2.769,2.769,0,0,1-1.971.817h0a2.766,2.766,0,0,1-1.969-.816,1,1,0,1,0-1.415,1.412,4.751,4.751,0,0,0,3.384,1.4h0a4.752,4.752,0,0,0,3.385-1.4l5.8-5.8a4.786,4.786,0,0,0,0-6.771Z\"\/><\/g><\/svg><\/a>The path forward<\/h2>\n<p class=\"chakra-text css-gi02ar\">There&#8217;s a strategic reason to lock in on zkEVM security now.<\/p>\n<p class=\"chakra-text css-gi02ar\">Securing a moving target is hard. Once teams have hit these targets and zkVM architectures stabilize, the formal verification work <a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-vezwxf\" href=\"https:\/\/verified-zkevm.org\/\">we&#8217;ve been investing in<\/a> can reach its full potential. By H-star, we hope the proof system layer will have mostly <em class=\"chakra-text css-0\">settled<\/em>. Not frozen forever, but stable enough to formally verify critical components, finalize security proofs, and write specifications that match deployed code.<\/p>\n<p class=\"chakra-text css-gi02ar\">This is the foundation that is required to get to secure L1 zkEVMs.<\/p>\n<h2 class=\"chakra-heading group css-1kpzc4q\" id=\"building-foundations\" data-group=\"true\"><a class=\"chakra-link css-128fqrf\" aria-label=\"building foundations permalink\" href=\"#building-foundations\"><svg viewbox=\"0 0 24 24\" focusable=\"false\" class=\"chakra-icon css-173jpr1\"><g fill=\"currentColor\"><path d=\"M10.458,18.374,7.721,21.11a2.853,2.853,0,0,1-3.942,0l-.892-.891a2.787,2.787,0,0,1,0-3.941l5.8-5.8a2.789,2.789,0,0,1,3.942,0l.893.892A1,1,0,0,0,14.94,9.952l-.893-.892a4.791,4.791,0,0,0-6.771,0l-5.8,5.8a4.787,4.787,0,0,0,0,6.77l.892.891a4.785,4.785,0,0,0,6.771,0l2.736-2.735a1,1,0,1,0-1.414-1.415Z\"\/><path d=\"M22.526,2.363l-.892-.892a4.8,4.8,0,0,0-6.77,0l-2.905,2.9a1,1,0,0,0,1.414,1.414l2.9-2.9a2.79,2.79,0,0,1,3.941,0l.893.893a2.786,2.786,0,0,1,0,3.942l-5.8,5.8a2.769,2.769,0,0,1-1.971.817h0a2.766,2.766,0,0,1-1.969-.816,1,1,0,1,0-1.415,1.412,4.751,4.751,0,0,0,3.384,1.4h0a4.752,4.752,0,0,0,3.385-1.4l5.8-5.8a4.786,4.786,0,0,0,0-6.771Z\"\/><\/g><\/svg><\/a>Building foundations<\/h2>\n<p class=\"chakra-text css-gi02ar\">A year ago, the question was whether zkEVMs could prove fast enough. That question is answered. The new question is whether they can prove soundly enough. We are confident they can.<\/p>\n<p class=\"chakra-text css-gi02ar\">On our end:<\/p>\n<ul role=\"list\" class=\"css-1ars4k6\">\n<li class=\"css-0\">In January, we&#8217;ll publish a post clarifying and formalizing the milestones above.<\/li>\n<li class=\"css-0\">We will follow up with a technical post outlining proof system techniques for reaching the security and proof size targets.<\/li>\n<li class=\"css-0\">At the same time, we will be updating Ethproofs to reflect this shift: highlighting security alongside performance.<\/li>\n<li class=\"css-0\">We are here to help throughout this process. Reach out to the EF cryptography team.<\/li>\n<\/ul>\n<p class=\"chakra-text css-gi02ar\">The performance sprint is over. Now let&#8217;s strengthen the foundations.<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/blog.ethereum.org\/en\/2025\/12\/18\/zkevm-security-foundations\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Thanks to Arantxa Zapico, Benedikt Wagner, and Dmitry Khovratovich from the EF cryptography team for their contributions, and to Ladislaus, Kev, Alex, and Marius for the careful review and feedback. The zkEVM ecosystem has been sprinting for a year. And it worked! We crossed the finish line for real-time proving! Now comes the next phase: [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"tdm_status":"","tdm_grid_status":"","footnotes":""},"categories":[24],"tags":[],"kronos_expire_date":[],"class_list":["post-17375","post","type-post","status-publish","format-standard","hentry","category-ethereum"],"_links":{"self":[{"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/posts\/17375","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/comments?post=17375"}],"version-history":[{"count":0,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/posts\/17375\/revisions"}],"wp:attachment":[{"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/media?parent=17375"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/categories?post=17375"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/tags?post=17375"},{"taxonomy":"kronos_expire_date","embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/kronos_expire_date?post=17375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}