Event  KryptenKrypt
Prizes worth Rs 6000 up for grabs for this event. Make the most of this opportunity and register now!
Introduction:
Cryptography is the art and science of preparing coded or protected communications intended to be intelligible only to the person possessing a key. Cryptography refers both to the process or skill of communicating in or deciphering secret writings (codes, or ciphers) and to the use of codes to convert computerized data so that only a specific recipient will be able to read it using a key.
Format:
The event will consist of a seminar on cryptography and some related concepts followed by three rounds of competition.
The seminar will be given by the organizers under the guidance of faculty. The talk will be on cryptography in general, the following topics to be covered in particular:
1. Ciphers
2. Number Theory
3. The Navajo alphabet code
4. The Data encryption standard
5. The Advanced Encryption Standard: Rijndael
6. The RSA algorithm
7. Digital Signatures
The three rounds of competition will go as follows:
Round 1:
 All the registered students are eligible for this round.
 Teams will have to face a written test with few questions related to cryptography. They have to complete the test within a specified time limit.
 Based on the marks scored, the best 10 teams will proceed for the next round. (Each question will have different weight age based on the difficulty level).
Example 1:
AOYMSLCOQMDY, SDK QOS LB PKAOKA VOESEJC EPSDE ILPS PLTCDS QBSKO PTUFKAS LB OKAKJS SEIKP QP SDK JKKR BLO DEREJC IKPPQCKP EP BKHS UY KVKOYLJK BOLI PKAOKS HLVKOP SL SDK VECCKPS LB QOIEKP
The above text can be decrypted as shown below.
Cryptography, the art of secret writing is the most sought after subject of recent times as the need for hiding messages is felt by everyone from secret lovers to the biggest of armies.
Round 2:
 Each of the 10 teams will be given two questions to be solved as a computer program compiled in C/ C++.
 Fastest 5 teams to complete them correctly will proceed for the final round.
Example:
Consider Block cipher (to be discussed in the seminar). For encryption, we need to multiply the plaintext vector with a matrix which is a key in this case. Hence, for decrypting, we have to find the inverse of the key matrix and multiply with the cipher text. This can be done using a computer program which inverts the matrix and then multiplies it to the cipher text.
Round 3:
 Each team reaching finals should frame a question and submit them to the organizers within the given time along with the expected solution.
 The correctness of the framed questions is an important criterion for staying in the competition.
 Each of the five teams will be given two questions, one from the organizer's side and the other randomly selected from any other competing team.
 The team will be given a fixed time limit. They have to solve both the questions correctly. The winners will be decided on the basis of the correctness and the time taken.
Rules:
 Each team should have two members.
 Registration for each team should be done before the date specified by the quark organizing committee.
Eligibility:
All students with a valid identity card of their respective educational institutes are eligible to participate in the event.
Special Note:
 The decision of the judges shall be treated as final and binding on all.
 The organizers reserve the rights to change any or all of the above rules as they deem fit. Change in rules, if any will be highlighted on the website and notified to the registered participants.
Event Managers:
Paavni Rattan +91 9823805729 
Ipsita Basak +91 9850651152 
[email protected]
