Challenge
A plaintext file has been encrypted with ATOFIA 416-Bit Encryption. The challenge is to decrypt the file and read it.

An Invitation

Over the past forty years, great minds and visionaries like Merkle, Diffie, and Hellman for key exchange and Rivest, Shamir and Aldeman for encryption have been the bedrock for today’s cryptography solutions. Their discoveries were ground breaking and continue to inspire companies like ATOFIA to explore new possibilities in the world of cryptography. 

ATOFIA is taking a new approach and invites you to take this distinct challenge. We hope you find this challenge as a welcoming introduction to our cryptography.

We truly appreciate your interest and support.

The ATOFIA team.

Our Challenge

A plaintext file has been encrypted with ATOFIA 416-Bit Encryption. 

The challenge is to decrypt the file and read it.

Terms and Conditions of Participation:

The Hacker Challenge includes

(1) your download of an encrypted text file; and (2) the challenge for you to decrypt it into readable text!

The Hacker Challenge is voluntary and there is no fee for participating and no reward for successfully decrypting the file. The purpose of the Hacker Challenge is just to see if you can successfully do it! The Hacker Challenge (including the text file) is provided as is with no warranty of any kind and there is no liability to any party of any kind whatsoever. You are under no obligation to do anything with the text file whatsoever and ATOFIA has no obligation to you for any purpose whatsoever. Of course, we would love to hear from you if you are successful, but you are under no obligation to contact us.

By clicking on the button below to download the file, you agree to the terms of this paragraph.

Hackers

Whether you are a script kiddie or one of the best hackers in the world, test your skills against a new type of cryptography for plaintext files. Click “Get It Now” and we will email you the encrypted file.

Super Computers

Test your super computer’s petaflops against our new mathematical models for cryptography. Give your super computer the computationally demanding workout it deserves. At this time, this challenge is only available to super computers located in the United States.