Hi All, Sorry this took so long.
Tigerspike is inviting everyone to make up to USD10,000 by being the first to crack our Karacell 3 encryption, using the weakest keys that it supports (121 bits). (Please note that this algo differs in key ways from Karacell (1), released in whitepaper form in 2012. And thanks for all the feedback!) Everything you need is here, including rules, contest files, source code (see COPYING for license terms), and documentation: http://karacell.info Questions about the contest should be sent to the address on the site, so we don't drown Randombit in irrelevant discussion. But questions or debates about the algo itself are fair game to post here. By the way, we've already built a fully functional cryptophone module with the Karacell 3 streaming kernel (as in, plug it into a supported phone (e.g. Android) and it becomes a cryptophone). In addition to creating a new product line, this was done in order to demonstrate performance on a low-end ARM processor. There is no detectable latency apart from what VOIP already imposes due to packet buffering. For those of you with a 512-qubit DWave quantum computer at your disposal (which you're welcome to use), here are the instructions for cracking Subset Sum, which as far as we can tell, is instrumental to cracking Karacell 3: http://www.dwavesys.com/en/dev-tutorial-blackbox.html#section1p5 Here's the press release: http://www.prweb.com/releases/2013/TigerspikeKaicomm/prweb10757944.htm Happy hacking! Russell Leidich
_______________________________________________ cryptography mailing list [email protected] http://lists.randombit.net/mailman/listinfo/cryptography
