You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I'm really not an expert on encryption or cryptography, and the safety of Speck for this use has been put into question (on IRC, no less). So I propose a bug bounty. The first person (according to Github's timestamps) to recover the key used for encrypting the vectors below and reply with said key here by the end of 2017 will receive a donation of 25 U.S. dollars via PayPal or bitcoin (your choice). Note that you're supposed to attack the algorithm, not my implementation thereof -- though if you find bugs in my implementation and report them back, I'll be happy to incorporate the fixes and give you credit, of course!
So I won't cheat, the sha512 of the base-10 representation of the key is c9cad3ef60dc0e7e87601f739e90eb08d07af39b8144e27794a3c51bed2755beb3d79ace394e8aea362acb79e730f67ee87631d446daea52d5bc8657fa7822c9.
I'm really not an expert on encryption or cryptography, and the safety of Speck for this use has been put into question (on IRC, no less). So I propose a bug bounty. The first person (according to Github's timestamps) to recover the key used for encrypting the vectors below and reply with said key here by the end of 2017 will receive a donation of 25 U.S. dollars via PayPal or bitcoin (your choice). Note that you're supposed to attack the algorithm, not my implementation thereof -- though if you find bugs in my implementation and report them back, I'll be happy to incorporate the fixes and give you credit, of course!
So I won't cheat, the sha512 of the base-10 representation of the key is c9cad3ef60dc0e7e87601f739e90eb08d07af39b8144e27794a3c51bed2755beb3d79ace394e8aea362acb79e730f67ee87631d446daea52d5bc8657fa7822c9.
The text was updated successfully, but these errors were encountered: