Round 1: (45 minutes)Description:Teams will work on two tasks simultaneously, with one participant focusing on one task and the other on a different task. Participants can assist each other if one task is completed early.
Sub-Round 1A:- Task: Participant 1 codes the decryption logic for the provided task using a code snippet without the main function.
- Points: 15
- Rules:
1. Participants will receive a code snippet with the main function missing. They need to complete the main decryption logic.
2. A sample output will be provided.
3. A description of how to approach the task will be given.
Sub-Round 1B:- Task: Participant 2 decrypts a provided cipher on paper.
- Points: 10
- Rules:
1. Participants need to decrypt the provided cipher using the paper-based method.
2. A description of how to approach the task will be given.
Note:Teams must complete both tasks in this round to proceed to the next round. If either task is not completed, 5 points will be deducted for each incomplete task.
Round 2: (45 minutes)Description:This round continues to test the participants' cryptography skills, with roles reversed from Round 1. The team member who decrypted on paper in Round 1 will now write the code, and the other team member will decrypt a cipher on paper.
Sub-Round 2A:- Task: Participant 1 (who decrypted on paper in Round 1) will code the solution for a provided cipher task from scratch.
- Points: 15
- Rules:
1. Participants must implement the program to solve the provided cipher using any data structure, such as stacks, queues, arrays, linked lists, etc.
2. A description of how to approach the task will be provided.
Sub-Round 2B:- Task: Participant 2 (who coded in Round 1) will decrypt a provided cipher on paper.
- Points: 10
- Rules:
1. Participants need to decrypt the provided cipher using a paper-based method.
2. A description of how to approach the task will be given.
Note:Teams must complete both tasks in this round to proceed to Round 3. If either task is not completed, 5 points will be deducted for each incomplete task.
Round 3: (1 hour)Description:In this round, participants will use a key obtained from the previous round to decode a cipher. This tests the participants' ability to apply cryptographic techniques and ensures the correct usage of provided data.
- Task: Use the key obtained from the previous round to decode a provided cipher.
- Points: 35
- Rules:
1. Participants must apply the key from the previous round directly to decrypt the provided cipher.
2. Do not attempt to brute force the key; use the provided key from the previous round.
3. Ensure correct application of the key for accurate decryption.
4. Any data structure can be used, such as stacks, queues, arrays, linked lists, etc.
Tie Breaker Round:Description:The tie-breaker round is designed to resolve any ties that occur between teams. In this round, one participant from each tied team will decrypt a provided cipher using a paper-based method. The round is time-based; the first participant to solve the cipher wins the event.
- Task: Decrypt a provided cipher on paper (only 1 participant).
- Rules:
1. The tie-breaker will involve decrypting a cipher using a paper-based method.
2. Only one participant from the tied teams will participate in this round.
3. The first team to solve the cipher will win the event.