Invest about 100 Bitcoins (BTC) at https://www.bitmit.net/item/15000/?ref=6004 and I will. Priority is valid for 1 year; during this period, patent claims have to be made worldwide. The algorithm shall be free for use with non-commercial Linux, Berkley Systems Design (BSD), and HURD distributions.
I invented it while designing SecuriNet — which is meant to be broken into rathen than being guarded from attacks, one of which will eventually be successfull — and analysing possible attack vectors. Each SecuriNet node must withstand Kriegsmarine Unterseeboot 110 (U-110) and Unterseeboot 559 (U-559) scenarios against Ultra-, and Special-Operations-Executive-(SOE)-like operations, even though it is actually a civillian system to be commercially available to all. Of course, Signals Intelligence (SIGINT) services might be "slightly" unhappy about that, kind of like with Arthur Scherbius' Enigma — a commercial teleprinter sold by Scherbius & Ritter.
I had contacted Državni zavod za intelektualno vlasništvo — the State Department for Intellectual Property — of the Republic of Croatia and then the Swiss Federal Institute of Intellectual Property in late 2011 and posted — hinted — about it at StackExchange in early 2012, prior to my Internet connection being blocked and put under surveillance on February 24, 2012 UTC after I notified the European Court of Human Rights (ECHR), the Council of Europe (CoE) etc. on February 23, 2012 UTC of the contents of my disk which my psychopathic — basically only biological — father stole from me on August 28, 2009 UTC — first trying to get me to enter the decryption password for several days — and the fact that the Iranian electronic warfare unit hijacked the Lockheed-Martin RQ-170 — reconnaissance unmanned 170 — Sentinel 27 months after the disk — containing regular and backdoor — bouncer 0.2 — access parametres — encrypted using a 6e+30-combinations-scale password — to the Air Force Material Command (AFMC) etc. of the United States of America (USA) was stolen. The delay matches the delay necessary to break the encryotion on common hardware using advanced search patterns or an all-probable-combinations search on Application Specific Integrated Circuits (ASICs). The 6e+30 combinations assumes a basic 84-most-common-password-characters linear attack on the ciphertext. Something like Anticipher can break it in a matter of days.