Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bug bounty #2

Open
johto opened this issue Nov 17, 2016 · 0 comments
Open

Bug bounty #2

johto opened this issue Nov 17, 2016 · 0 comments

Comments

@johto
Copy link
Owner

johto commented Nov 17, 2016

I'm really not an expert on encryption or cryptography, and the safety of Speck for this use has been put into question (on IRC, no less). So I propose a bug bounty. The first person (according to Github's timestamps) to recover the key used for encrypting the vectors below and reply with said key here by the end of 2017 will receive a donation of 25 U.S. dollars via PayPal or bitcoin (your choice). Note that you're supposed to attack the algorithm, not my implementation thereof -- though if you find bugs in my implementation and report them back, I'll be happy to incorporate the fixes and give you credit, of course!

So I won't cheat, the sha512 of the base-10 representation of the key is c9cad3ef60dc0e7e87601f739e90eb08d07af39b8144e27794a3c51bed2755beb3d79ace394e8aea362acb79e730f67ee87631d446daea52d5bc8657fa7822c9.

 i  | pgspeck_encrypt32 
----+-------------------
  1 |        1303549253
  2 |        3679528679
  3 |        2470228315
  4 |        1106314420
  5 |        3921751604
  6 |        2876855146
  7 |         542921472
  8 |        2198041051
  9 |         188535765
 10 |         823079958
(10 rows)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant