Hi All,

Sorry this took so long.

Tigerspike is inviting everyone to make up to USD10,000 by being the first
to crack our Karacell 3 encryption, using the weakest keys that it supports
(121 bits). (Please note that this algo differs in key ways from Karacell
(1), released in whitepaper form in 2012. And thanks for all the feedback!)
Everything you need is here, including rules, contest files, source code
(see COPYING for license terms), and documentation: http://karacell.info

Questions about the contest should be sent to the address on the site, so
we don't drown Randombit in irrelevant discussion. But questions or debates
about the algo itself are fair game to post here.

By the way, we've already built a fully functional cryptophone module with
the Karacell 3 streaming kernel (as in, plug it into a supported phone
(e.g. Android) and it becomes a cryptophone). In addition to creating a new
product line, this was done in order to demonstrate performance on a
low-end ARM processor. There is no detectable latency apart from what VOIP
already imposes due to packet buffering.

For those of you with a 512-qubit DWave quantum computer at your disposal
(which you're welcome to use), here are the instructions for cracking
Subset Sum, which as far as we can tell, is instrumental to cracking
Karacell 3:

http://www.dwavesys.com/en/dev-tutorial-blackbox.html#section1p5

Here's the press release:

http://www.prweb.com/releases/2013/TigerspikeKaicomm/prweb10757944.htm

Happy hacking!

Russell Leidich
_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to