Feeds

Swedes mash 512-bit Code Book crypto challenge to get £10,000

Tjr klq t pumgp-eljmuqgo bk pbsaq!

  • alert
  • submit to reddit

Top three mobile application threats

A team of researchers in Sweden has cracked the final cipher set by Simon Singh in "The Code Book" and claimed the £10,000 prize. It took a year and month between publication of the challenge and its completion without the use of a super computer.

Singh set a challenge to would be cryptologists at the end of his book, which catalogues the history and development of ciphers and codes from a mono-alphabetic substitution cipher through to current Internet encryption standards. It was intended to be the toughest public cipher challenge ever set.

A series of ten ciphers were set, in chronological order and hence increasing in complexity. The final stage is similar to the kind of encryption used for internet security and used a 512-bit encryption key. The details of the cipher were checked with Paul Leyland, an encryption specialist working at Microsoft's research Labs in Cambridge.

There are clearly implications for the security of documents sent using similar encryption technologies. Singh's publishers are keen to stress that this deciphering does not imply an inherent weakness, merely serves as a timely reminder that the security of all encryption must be continually monitored.

The original deadline for entries to the contest was the first of January 2010. If no one had claimed the prize by then, the money would have gone to the person who had got the furthest first. ®

We will update this story when we've interviewed the people involved in the challenge.

Related Link

The Code Book cypher challenge web site

The Essential Guide to IT Transformation

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
Nadella: Apps must run on ALL WINDOWS – PCs, slabs and mobes
Phone egg, meet desktop chicken - your mother
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.