Rules to be Followed
1) Players are required to register on https://dare2compete.com/o/blockbuster-crypto-ignite-30-by-nmims-navi-mumbai-narsee-monjee-institute-of-management-studies-nmims-navi-mumbai-153401 or https://nmignite.tech/blockbuster-crypto before the match.
- Players are required to pre-install MS TEAMS AND DISCORD before the match.
3) Time limit for the entire game is 15 minutes, players have 15 minutes to decode the clues and finish the game.
- There are in total 3 ROUNDS. The players will be given 2 chances to guess the correct answer in Round 1. In Round 2 & 3 only 1 chance would be given. After all the chances are exhausted, the game will end and the team will be disqualified.
5) Game – Master will be there throughout the game to guide and solve your queries.
6) Google is allowed (only for decoding) and the links for the cyphers will be provided.
-
If the player gets disconnected due to network issues, he/she is supposed to inform the organizer immediately and join the meeting within 2-3 minutes without fail.
-
Any sort of cheating/ malpractice will not be appreciated and the team will, therefore, be disqualified.
Video Explanation
https://youtu.be/-Ns_dzcF2TE
Basic Information
- COMBINATION OF BOLLYWOOD AND CRYPTOGRAPHY: The concept of cryptography in India is almost equal to 0. Hence to introduce and explain what cryptography actually is, we have come up with an interesting game combining Bollywood and cryptography together. The dialogues are ciphered, decode them using the ciphers and figure out the dialogue/ from which movie the dialogue is / actor/actress spoken to / referred to in the movie.
- CRYPTOGRAPHY: In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is encipherment. To encipher or encode is to convert information into cipher or code. In common parlance, "cipher" is synonymous with "code", as they are both a set of steps that encrypt a message; however, the concepts are distinct in cryptography, especially classical cryptography.
- · TYPES OF CIPHERS USED IN THE GAME:
- CAESAR CIPHER: Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet.
- Example: “TUM BAHUT MAST KAM KARTA HAI” is a dialogue from MUNNA BHAI MBBS. Below we have used Caesar cipher and shifted alphabets from 4.
- Ciphered code: XYQ FELYX QEWX OEQ OEVXE LEM
- Link of decoder: https://www.dcode.fr/caesar-cipher
- VIGENERE CIPHER: The vigenere cipher is an algorithm of encrypting an alphabetic text that uses a series of interwoven Caesar ciphers. It is based on a keyword's letters. It is an example of a polyalphabetic substitution cipher.
- Example: “TUM BAHUT MAST KAM KARTA HAI” is a dialogue from MUNNA BHAI MBBS. Below we have used Vigenere cipher and key is MUNNA.
- Ciphered code: FOZ OATOG ZAEN XNM WUEGA TUV
- Link of decoder: https://www.dcode.fr/vigenere-cipher
- TRANSPOSITION CIPHER: A transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext. That is, the order of the units is changed (the plaintext is reordered).
- Example: “TUM BAHUT MAST KAM KARTA HAI” is a dialogue from MUNNA BHAI MBBS. Below we have used Transposition cipher and key is MUNNA.
- Ciphered code: B␣␣K␣TAMKAHMUSMTI␣TT␣AUHAARA
- Link of decoder: https://www.dcode.fr/transposition-cipher
- · ALSO INCLUDED: Morse code, logical questions and few random Bollywood questions are also included to boost the fun. Hence, one must have normal Bollywood movies knowledge and logical reasoning skills.