Cryptography and Steganography  |  Registration Process  |  The competition – De Cipher  |  Award  |  Key Dates

Would you like to discover the hidden code embedded in the picture?
Can you solve ciphers?
Do you like to take the chance to use your mathematical and programming skills to win awards?

Then De Cipher is for you !!!
De Cipher is an online Hacking Coding Competition. Participants can register for the competition using the form below. The coding link will be activated at the date and time of the competition.

Cryptography and Steganography

Cryptography is the practice and study of hiding information. It is the science used to try to keep information secret and safe. Modern cryptography is a mix of mathematics, computer science, and electrical engineering.
When a message is sent using cryptography, it is changed (or encrypted) before it is sent. The method of changing text is called a "code" or, more precisely, a "cipher". The changed text is called "ciphertext". The change makes the message hard to read. Someone who wants to read it must change it back (or decrypt it). How to change it back is a secret. Both the person that sends the message and the one that gets it should know the secret way to change it, but other people should not be able to. Studying the ciphertext to discover the secret is called "cryptanalysis" or "cracking" or sometimes "code breaking".
Different types of cryptography can be easier or harder to use and can hide the secret message better or worse. Ciphers use a "key" which is a secret that hides the secret messages. The cryptographic method needn't be secret. Various people can use the same method but different keys, so they cannot read each other's messages. Since the Caesar cipher has only as many keys as the number of letters in the alphabet, it is easily cracked by trying all the keys. Ciphers that allow billions of keys are cracked by more complex methods.

Steganography (coming from Greek steganos, or "covered," and graphie, or "writing") is the hiding of a secret message within an ordinary message and the extraction of it at its destination. Steganography takes cryptography a step farther by hiding an encrypted message so that no one suspects it exists. Ideally, anyone scanning your data will fail to know it contains encrypted data.
In modern digital steganography, data is first encrypted by the usual means and then inserted, using a special algorithm, into redundant (that is, provided but unneeded) data that is part of a particular file format such as a JPEG image. Think of all the bits that represent the same color pixels repeated in a row. By applying the encrypted data to this redundant data in some random or nonconspicuous way, the result will be data that appears to have the "noise" patterns of regular, nonencrypted data. A trademark or other identifying symbol hidden in software code is sometimes known as a watermark.

For more details click here.

Registration Process
• The participants must register themselves using the registration form given below
• The last date of registration is 30/03/2018
• Maximum 3 members can participate per team
• Entrants should be part of only one team
• The competition is open to all persons around the globe
• Each team should have a team name registered and all the members of the team should register individually mentioning the team name
• Each team and each team member will be asked to provide a valid email address
• Once participant has registered, they will be provided with further details of participation procedure by his/her email address
• No participation fees for the competition

The competition – De Cipher
1. The competition will comprise of two levels.
2. Teams who qualify for level 1 can participate in level 2.
3. Date of level 1 competition – 31/03/2018.
4. Date of level 2 competition – 01/04/2018.
5. Each level will comprise of 3 problems to be solved in a given time after which the link for it will be disabled.
6. Problem may contain a picture in which an embedded cipher is hidden. The participants should at first decode the cipher from the image and then should decrypt it.
7. Hints of the algorithm will be provided. Participants may use any programming language to get the answer.
8. The programs can be written using C / C++ / C# / JAVA / Python and to be submitted online.

A cash prize of 50,000 (INR) will be divided among top ten coding competition winner.

Key Dates
• Registration for coding competition: 05.01.2018 to 30.03.2018
• Competition Date: 31.03.2018 and 01.04.2018