PMC Ciphers issues code cracking challenge for a 32 bit key
The winner receives 41.304g pure gold in the form of gold coins
"The keyphrase consists of up to five characters "0 ..9", "a..z" und "A..Z" and one trailing character "a..d" - e.g. "0z1y2d". There exist exactly 3.724.605.612 equally possible key combinations, which corresponds with 31,79 bit. If the file was encrypted using a standard cipher like AES, the correct key could be identified with absolute certainty within an hour. Although keys with almost 32 bit length can guarantee perfect security under no circumstances, the probability is high that nobody will be able to break the key within only four weeks. Therefore would PMC Ciphers prove once again that even extremely short passwords are difficult to break for the Polymorphic High Encryption Algorithm", says C.B. Roellgen from PMC Ciphers. Mr. Roellgen adds "someone who has the computing power that is necessary to break the key and who actually identifies the key is at least that exceptional that I want to get to know him or her when the price is given. Handover of the price is thus The declared price is thus tied to appearance in person".
Later on February 11, 2012 will the keyphrase be published on the home page of PMC Ciphers (www.pmc-ciphers.com), so that everybody who is interested can easily decrypt the video and watch it.
More information and can be found at:
PMC Ciphers, Inc
PMC Ciphers (www.pmc-ciphers.com) is a marketing company for the Polymorphic Cipher invented by co-founder C.B. Roellgen in 1999. The company develops and markets ultra-secure ciphers based on the unique technology of the Polymorphic Cipher. All PMC Ciphers products are created in Germany. Polymorphic encryption technology is applied for encrypting voice and video in the VoIP telephones from Global IP Telecommunications, a leading manufacturer of Voice-over-IP software solutions with powerful autoprovisioning services (www.globaliptel.com).
Diese Pressemitteilungen könnten Sie auch interessieren
Weitere Informationen zum Thema "Sicherheit":
Vier Best-Practices für mehr Cyber-Sicherheit
WannaCry und NotPetya haben erneut deutlich gemacht, dass Cybersecurity essenziell ist. Zugleich wandelt sie sich: Milliarden neuer IoT-Geräte, dazu Laptops und Server bilden eine Angriffsoberfläche, die neue Ansätze für die Sicherheit erfordert. Der erste Schritt zum richtigen Schutz vor kommenden Angriffen sind bewährte Best Practices und der Wille sie umzusetzen.Weiterlesen