National Cipher Challenge


National Cipher Challenge

The National Cipher Challenge is an annual cryptographic competition organised by the University of Southampton School of Mathematics. Competitors attempt to break cryptograms published on the competition website. In the 2007/08 challenge, 1301 teams participated. Participants must be in full time education and aged 18 or under on the 31st August of the year that the challenge finishes.

Format

The competition is organised into eight challenges, which are further subdivided into parts A and B. The part A challenge consists of a relatively simple cryptogram that is intended for beginning cryptographers. In later challenges the cryptograms become harder to break. In the past, part A cryptograms have been encrypted with the Caesar cipher, the Affine cipher, the Keyword cipher, the Transposition cipher and the Vigenère cipher.

The part B challenges are intended to be harder. These begin with relatively simple substitution ciphers, including the Bacon cipher and Polybius square, before moving on to transposition ciphers, Playfair ciphers and polyalphabetic ciphers such as the Vigenère cipher, the Autokey cipher and the Alberti cipher. In the later stages of the competition, the ADFGVX cipher, the Solitaire cipher, the Double Playfair cipher, the Hill cipher, the Book cipher and versions of the Enigma and Fialka cipher machines have all been used. The 2009 challenge ended with a Jefferson Disk cipher, and the most recent challenge ended with the Solitaire Cipher.

Prizes

£25 cash prizes are awarded to eight random entrants who submit a correct solution for each part A of the challenge. Leaderboards for the part B challenges are also compiled, based on how accurate solutions are and how quickly the entrant broke the cipher. Prizes are awarded to the top three entrants at the end of the challenge. In the 2009/10 challenge, the sponsors provided several prizes: IBM provided iPod Touches to each member of the team winning the Team Prize, Trinity College provided a cash prize of £700, and GCHQ provided a cash prize of £1000. In previous years prizes such as an IBM Thinkpad laptop have been awarded.

After the challenge the winners of the top prizes and other randomly selected entrants are invited to a day held at Bletchley Park consisting of lectures (with subjects such as the Semantic Web, World War II cryptography and computer programming) and the prize-giving ceremony.

Current sponsors of the competition include GCHQ, IBM, British Computer Society, Trinity College, Cambridge, Cambridge University Press and EPSRC.

External links


Wikimedia Foundation. 2010.

Look at other dictionaries:

  • National Investigation Agency (India) — Nia redirects here. For the album by Blackalicious, see Nia (album). National Investigation Agency Common name NIA Logo of the Natio …   Wikipedia

  • Cryptanalysis — Close up of the rotors in a Fialka cipher machine Cryptanalysis (from the Greek kryptós, hidden , and analýein, to loosen or to untie ) is the study of methods for obtaining the meaning of encrypted information, without access to the secret… …   Wikipedia

  • University of Southampton — Infobox University name = University of Southampton image size = 243px motto = Strenuis Ardua Cedunt The Heights Yield to Endeavour established = 1862 Hartley Institution 1902 University College 1952 Royal Charter chancellor = Sir John Parker… …   Wikipedia

  • Colossus computer — Colossus MkI/MkII A Colossus Mark 2 computer. The operator on the left is Dorothy Duboisson. The slanted control panel on the left was used to set the pin patterns on the Lorenz. The bedstead paper tape transport is on the right. Developer Tommy… …   Wikipedia

  • ENIGMA — Markenschild der ENIGMA Die deutsche Schlüsselmaschine ENIGMA …   Deutsch Wikipedia

  • Enigma (Maschine) — Markenschild der ENIGMA Die deutsche Schlüsselmaschine …   Deutsch Wikipedia

  • cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction …   Universalium

  • Cryptanalysis of the Enigma — enabled the western Allies in World War II to read substantial amounts of secret Morse coded radio communications of the Axis powers that had been enciphered using Enigma machines. This yielded military intelligence which, along with that from… …   Wikipedia

  • 3DES — DES Eine Feistel Runde (F Funktion) Entwickler IBM Veröffentlicht 1975 Abgeleitet von Lucifer …   Deutsch Wikipedia

  • DEA1 — DES Eine Feistel Runde (F Funktion) Entwickler IBM Veröffentlicht 1975 Abgeleitet von Lucifer …   Deutsch Wikipedia


Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”

We are using cookies for the best presentation of our site. Continuing to use this site, you agree with this.