1996-07-24 - No Subject

Header Data

From: Bill Stewart <stewarts@ix.netcom.com>
To: cypherpunks@toad.com
Message Hash: 1a2adc62468d0507d91c5cdfed2e7c22d93014f89a8da69de62b5d0ac6bef6ef
Message ID: <199607240318.UAA08747@toad.com>
Reply To: N/A
UTC Datetime: 1996-07-24 06:24:37 UTC
Raw Date: Wed, 24 Jul 1996 14:24:37 +0800

Raw message

From: Bill Stewart <stewarts@ix.netcom.com>
Date: Wed, 24 Jul 1996 14:24:37 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199607240318.UAA08747@toad.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

To: cypherpunks
From: Bill Stewart
Date: 7/23/96

Tim wrote:
>| More realistically, 1000+ list members x 10% who make plans to
>| contribute x half of these who actually follow through x $10 = $500.
>| (If that....)
>| Prizes have their place, but are hard to set up properly.

All right, $100 to the winner, by the end of 1996,
for a reasonably-convincingly-non-rigged public crack of DES,
whether it's from a net-run or screen-saver effort,
a DES cracker using fancy special equipment, supercomputers,
microcomputers, DES chips, or Gate Array chips.
$100 extra bonus if the winner is from the NSA or FBI 
(Black-bag jobs, rubber-hose cryptanalysis, and subpoenas
all count as rigged - sorry :-)

At 08:46 AM 7/23/96 -0500, Adam Shostack <adam@homeport.org> wrote:
>	A better way to set up a prize is to find a few big companies
>willing to sponsor such a demonstration.  AT&T, Nortel, RSA, Netscape,
>Microsoft, Qualcomm, and many other companies have an interest in
>seeing stronger than DES crypto exportable.  Perhaps one of them could
>set up a prize, similar to netscape's Bugs Bounty, or the RSA-129
>challenge.

Perhaps cracking 56-bit DES would count as a new bug for Netscape's
existing Bugs Bounty?  

                                  Bill Stewart


-----BEGIN PGP SIGNATURE-----
Version: 2.7.1
Comment: PGP available outside U.S.A. at ftp.ox.ac.uk

iQBVAwUBMfWVOPthU5e7emAFAQG99QIAlKIBWs8ynr00uincnNBCymdz2E8CrlL3
MhCndNxOgpFIkjvJSdHNT+4alt2hsgU3fMlK8xWOK56R8WxdkTZvMw==
=GesG
-----END PGP SIGNATURE-----






Thread