Alert Source Discuss
⚠️ Draft Standards Track: Core

EIP-7667: Raise gas costs of hash functions

Raise the gas costs of hash function opcodes and precompiles, to match prover expenses in ZK-EVMs

Authors Vitalik Buterin (@vbuterin)
Created 2024-03-31
Discussion Link


Raise the gas costs of opcodes and precompiles that involve hash functions.


Gas costs for hash function opcodes and precompiles were originally set based on the time that it takes to execute them on a regular CPU. Since then, however, there has emerged another equally important execution substrate that the EVM is executed on: zero knowledge proof (ZK-SNARK) systems. By that standard, these opcodes and precompiles are very underpriced relative to other operations.

Blocks that are heavy with hash function executions take much longer to ZK-SNARK prove than average blocks. Today, many layer-2 protocols are using workarounds such as arbitrary limits and rules enforced by centralized sequencers to deal with this issue. These workarounds are often poorly designed and lead to unneeded security and centralization concerns.

Additionally, there is a design goal of eventually using ZK-SNARKs to prove the correctness of layer-1 Ethereum blocks. To do this, we need to establish very tight bounds on how long it takes to generate a ZK-SNARK proof of an Ethereum execution block’s correctness. Today, the difference between average-case proving time and worst-case proving time is large, and hash function executions are the largest reason why.

Verkle trees solve the part of this problem that comes from Keccak hashing in the Merkle Patricia tree. Today, the theoretical worst case is a block with 30000000 / 2600 = 11538 account accesses (minus a small percent for EVM overhead), where proving each access would require proving 24000 bytes of code, plus a roughly 512 * log(500m) / log(16) = 3712 byte Merkle-Patricia proof: roughly 305 MB of hashing spread between 83650 hash calls. Verkle trees solve this. However, using opcodes, a block execution can still require roughly the following amount of hashing:

Hash Cost per word Maximum bytes from 30 million gas
KECCAK (opcode) 6 160 million
SHA256 (precompile) 12 80 million
RIPEMD (precompile) 120 8 million
BLAKE2 (precompile) 3 (12 per 128 bytes) 320 million
LOG* (hashing data) 256 (8 per byte) 3.75 million

These hash functions have been optimized for rapid CPU computation, so CPUs can compute them quickly: for example, this author’s laptop can compute a 160-million byte keccak in less than half a second. In ZK-SNARKs, however, these operations are very time-consuming and inefficient. This is mitigated in newer proof systems based on small fields, but hashes remain underpriced.


Parameter Previous value New value
SHA256_BASE_COST 60 300
SHA256_WORD_COST 12 60

Change the above parameters to their new values.


The above increases the gas costs of all opcodes and precompiles that can be used to require large amounts of hashing in the EVM. All hashing costs are increased to 300 per hash plus 60 per word (or kept the same if they are already higher than this). ‘” A possible alternative to this approach is to implement either multidimensional gas pricing (ie. a separate floating basefee and per-block target and limit for hashes) or a “total gas cost floor” similar to what EIP-7623 does for calldata. However, this approach is much harder to implement for in-EVM gas costs such as hashes than it is for calldata and blobs, because EVM gas limits are set not just by users, for whom new transaction types that specify newly required limits, max-basefees and priority fees can easily be added, but also by contracts making sub-calls to other contracts.

Backwards Compatibility

For most applications, a reasonable upper bound is that data that is getting hashed in the EVM is getting brought in as calldata. If the hashing being done is binary Merkle proof verification, every 32 bytes of data corresponds to a 64-byte (2-word) hash. A word of costs 512 gas. Under the new costs, the hashing per word in that situation would be 300 + 60 * 2 = 420 gas. Hence, this will increase gas consumption for that component of the application by less than 2x.

Concretely, a length-20 Keccak-based binary Merkle proof gas cost would increase from (512 + 42) * 20 = 11080 to (512 + 420) * 20 = 18640. This is a small increase, especially taking into account other costs associated with such an application.

Security Considerations

As no new operations are introduced or made cheaper, no security concerns were raised.

Copyright and related rights waived via CC0.


Please cite this document as:

Vitalik Buterin (@vbuterin), "EIP-7667: Raise gas costs of hash functions [DRAFT]," Ethereum Improvement Proposals, no. 7667, March 2024. [Online serial]. Available: