
International Hackathon on Cryptography and Mathematical Security
by Mastering Up
72 72 people viewed this event.
<h4 data-start="173" data-end="247"><strong data-start="176" data-end="245">International Hackathon on Cryptography and Mathematical Security</strong></h4>
<p data-start="248" data-end="395"><strong data-start="248" data-end="257">Date:</strong> September 19–21, 2026<br data-start="279" data-end="282" /><strong data-start="282" data-end="291">Mode:</strong> Online<br data-start="298" data-end="301" /><strong data-start="301" data-end="314">Convenor:</strong> Ms. Suguna B – Co-Founder & CBO, Mastering Up<br data-start="360" data-end="363" /><strong data-start="363" data-end="380">Organized by:</strong> Mastering Up</p>
<hr data-start="397" data-end="400" />
<h5 data-start="402" data-end="432"><strong data-start="406" data-end="432">1] About the Hackathon</strong></h5>
<p data-start="434" data-end="828">The <em data-start="438" data-end="510">International Hackathon on Cryptography and Mathematical Security 2026</em> is a global platform designed to foster innovation in secure communication, encryption technologies, and privacy-preserving computation. With the growing complexity of cyber threats and the advent of quantum computing, the need for advanced mathematical frameworks to secure data and systems has never been greater.</p>
<p data-start="830" data-end="1195">This event brings together mathematicians, cryptographers, data scientists, cybersecurity experts, and developers to co-create next-generation solutions for information security. The hackathon encourages participants to explore classical and post-quantum cryptography, blockchain applications, secure protocols, and mathematical approaches to privacy and integrity.</p>
<hr data-start="1197" data-end="1200" />
<h5 data-start="1202" data-end="1240"><strong data-start="1206" data-end="1240">2] Problem Statements / Tracks</strong></h5>
<h4 data-start="1242" data-end="1285"><strong data-start="1247" data-end="1285">Track 1: Post-Quantum Cryptography</strong></h4>
<p data-start="1286" data-end="1543"><strong data-start="1286" data-end="1298">Problem:</strong> Traditional encryption algorithms like RSA and ECC are vulnerable to quantum attacks.<br data-start="1384" data-end="1387" /><strong data-start="1387" data-end="1409">Expected Solution:</strong> Develop or optimize quantum-resistant encryption algorithms using lattice-based, hash-based, or multivariate polynomial cryptography.</p>
<h4 data-start="1545" data-end="1590"><strong data-start="1550" data-end="1590">Track 2: Secure Blockchain Protocols</strong></h4>
<p data-start="1591" data-end="1826"><strong data-start="1591" data-end="1603">Problem:</strong> Blockchain systems face privacy, scalability, and integrity challenges.<br data-start="1675" data-end="1678" /><strong data-start="1678" data-end="1700">Expected Solution:</strong> Create cryptographic frameworks for secure, efficient blockchain consensus mechanisms and privacy-preserving smart contracts.</p>
<h4 data-start="1828" data-end="1881"><strong data-start="1833" data-end="1881">Track 3: Privacy-Preserving Machine Learning</strong></h4>
<p data-start="1882" data-end="2130"><strong data-start="1882" data-end="1894">Problem:</strong> Sharing sensitive data for AI training raises security and compliance concerns.<br data-start="1974" data-end="1977" /><strong data-start="1977" data-end="1999">Expected Solution:</strong> Build cryptographic models enabling federated learning, homomorphic encryption, or differential privacy in distributed AI systems.</p>
<h4 data-start="2132" data-end="2183"><strong data-start="2137" data-end="2183">Track 4: Zero-Knowledge Proof Applications</strong></h4>
<p data-start="2184" data-end="2422"><strong data-start="2184" data-end="2196">Problem:</strong> Users need to prove authenticity without revealing private information.<br data-start="2268" data-end="2271" /><strong data-start="2271" data-end="2293">Expected Solution:</strong> Implement zero-knowledge proof (ZKP) systems for secure authentication, blockchain validation, or digital identity verification.</p>
<h4 data-start="2424" data-end="2477"><strong data-start="2429" data-end="2477">Track 5: Cryptanalysis and Algorithm Testing</strong></h4>
<p data-start="2478" data-end="2731"><strong data-start="2478" data-end="2490">Problem:</strong> Many existing cryptographic algorithms have unknown vulnerabilities.<br data-start="2559" data-end="2562" /><strong data-start="2562" data-end="2584">Expected Solution:</strong> Develop automated cryptanalysis tools to test, evaluate, and strengthen encryption methods through mathematical validation and attack simulations.</p>
<h4 data-start="2733" data-end="2780"><strong data-start="2738" data-end="2780">Track 6: Cybersecurity for IoT Devices</strong></h4>
<p data-start="2781" data-end="3011"><strong data-start="2781" data-end="2793">Problem:</strong> IoT devices are prone to data leaks and unauthorized access due to weak cryptographic layers.<br data-start="2887" data-end="2890" /><strong data-start="2890" data-end="2912">Expected Solution:</strong> Design lightweight encryption and key management systems suitable for low-power IoT architectures.</p>
<h4 data-start="3013" data-end="3072"><strong data-start="3018" data-end="3072">Track 7: Quantum Key Distribution (QKD) Simulation</strong></h4>
<p data-start="3073" data-end="3325"><strong data-start="3073" data-end="3085">Problem:</strong> Quantum communication systems are still in the experimental stage.<br data-start="3152" data-end="3155" /><strong data-start="3155" data-end="3177">Expected Solution:</strong> Build simulations or prototype models demonstrating the efficiency and security of QKD protocols using mathematical proofs or virtual environments.</p>
<h4 data-start="3327" data-end="3383"><strong data-start="3332" data-end="3383">Track 8: Secure Voting and E-Governance Systems</strong></h4>
<p data-start="3384" data-end="3679"><strong data-start="3384" data-end="3396">Problem:</strong> Online voting and digital governance platforms face challenges in maintaining voter privacy and data authenticity.<br data-start="3511" data-end="3514" /><strong data-start="3514" data-end="3536">Expected Solution:</strong> Develop end-to-end verifiable cryptographic systems ensuring confidentiality, integrity, and auditability of e-governance or e-voting systems.</p>
<h4 data-start="3681" data-end="3729"><strong data-start="3686" data-end="3729">Track 9: Cryptography in Cloud Security</strong></h4>
<p data-start="3730" data-end="3987"><strong data-start="3730" data-end="3742">Problem:</strong> Cloud data storage and computation expose user data to potential breaches.<br data-start="3817" data-end="3820" /><strong data-start="3820" data-end="3842">Expected Solution:</strong> Create encryption frameworks supporting secure data-at-rest and data-in-use, leveraging homomorphic encryption or secure multiparty computation.</p>
<h4 data-start="3989" data-end="4036"><strong data-start="3994" data-end="4036">Track 10: Student Innovation Challenge</strong></h4>
<p data-start="4037" data-end="4214"><strong data-start="4037" data-end="4047">Theme:</strong> Open category for students to propose novel cryptographic or mathematical security solutions addressing modern-day digital threats, privacy, or information integrity.</p>
<hr data-start="4216" data-end="4219" />
<h5 data-start="4221" data-end="4258"><strong data-start="4225" data-end="4258">3] Event Schedule (Three-Day)</strong></h5>
<div class="_tableContainer_1rjym_1">
<div class="group _tableWrapper_1rjym_13 flex w-fit flex-col-reverse">
<table class="w-fit min-w-(--thread-content-width)" data-start="4260" data-end="4902">
<thead data-start="4260" data-end="4300">
<tr data-start="4260" data-end="4300">
<th data-start="4260" data-end="4270" data-col-size="sm"><strong data-start="4262" data-end="4269">Day</strong></th>
<th data-start="4270" data-end="4285" data-col-size="sm"><strong data-start="4272" data-end="4284">Activity</strong></th>
<th data-start="4285" data-end="4300" data-col-size="md"><strong data-start="4287" data-end="4298">Details</strong></th>
</tr>
</thead>
<tbody data-start="4344" data-end="4902">
<tr data-start="4344" data-end="4461">
<td data-start="4344" data-end="4372" data-col-size="sm"><strong data-start="4346" data-end="4371">Day 1 (Sept 19, 2026)</strong></td>
<td data-col-size="sm" data-start="4372" data-end="4405">Opening Ceremony & Orientation</td>
<td data-col-size="md" data-start="4405" data-end="4461">Event introduction, theme briefing, and mentor meet.</td>
</tr>
<tr data-start="4462" data-end="4555">
<td data-start="4462" data-end="4464" data-col-size="sm"></td>
<td data-start="4464" data-end="4504" data-col-size="sm">Team Formation & Problem Finalization</td>
<td data-start="4504" data-end="4555" data-col-size="md">Teams select tracks and finalize project focus.</td>
</tr>
<tr data-start="4556" data-end="4689">
<td data-start="4556" data-end="4584" data-col-size="sm"><strong data-start="4558" data-end="4583">Day 2 (Sept 20, 2026)</strong></td>
<td data-start="4584" data-end="4620" data-col-size="sm">Development & Mentorship Sessions</td>
<td data-start="4620" data-end="4689" data-col-size="md">Project development with mentor guidance and mid-hack evaluation.</td>
</tr>
<tr data-start="4690" data-end="4818">
<td data-start="4690" data-end="4718" data-col-size="sm"><strong data-start="4692" data-end="4717">Day 3 (Sept 21, 2026)</strong></td>
<td data-start="4718" data-end="4754" data-col-size="sm">Final Presentations & Jury Review</td>
<td data-start="4754" data-end="4818" data-col-size="md">Live demo and idea presentation before the evaluation panel.</td>
</tr>
<tr data-start="4819" data-end="4902">
<td data-start="4819" data-end="4821" data-col-size="sm"></td>
<td data-start="4821" data-end="4849" data-col-size="sm">Closing Ceremony & Awards</td>
<td data-start="4849" data-end="4902" data-col-size="md">Announcement of top teams and concluding remarks.</td>
</tr>
</tbody>
</table>
</div>
</div>
<hr data-start="4904" data-end="4907" />
<h5 data-start="4909" data-end="4953"><strong data-start="4913" data-end="4953">4] Eligibility & Participation Rules</strong></h5>
<ul data-start="4955" data-end="5403">
<li data-start="4955" data-end="4985">
<p data-start="4957" data-end="4985"><strong data-start="4957" data-end="4971">Team Size:</strong> 2–4 members</p>
</li>
<li data-start="4986" data-end="5114">
<p data-start="4988" data-end="5114"><strong data-start="4988" data-end="5004">Eligibility:</strong> Open to university students, professionals, and researchers from all technical or mathematical disciplines.</p>
</li>
<li data-start="5115" data-end="5403">
<p data-start="5117" data-end="5139"><strong data-start="5117" data-end="5137">Code of Conduct:</strong></p>
<ul data-start="5142" data-end="5403">
<li data-start="5142" data-end="5191">
<p data-start="5144" data-end="5191">Maintain professional ethics and team spirit.</p>
</li>
<li data-start="5194" data-end="5271">
<p data-start="5196" data-end="5271">Ensure originality of all submissions (no plagiarism or reused projects).</p>
</li>
<li data-start="5274" data-end="5330">
<p data-start="5276" data-end="5330">Respect intellectual property and data privacy laws.</p>
</li>
<li data-start="5333" data-end="5403">
<p data-start="5335" data-end="5403">Follow the guidelines and timelines shared by the organizing team.</p>
</li>
</ul>
</li>
</ul>
<hr data-start="5405" data-end="5408" />
<h5 data-start="5410" data-end="5440"><strong data-start="5414" data-end="5440">5] Evaluation Criteria</strong></h5>
<div class="_tableContainer_1rjym_1">
<div class="group _tableWrapper_1rjym_13 flex w-fit flex-col-reverse">
<table class="w-fit min-w-(--thread-content-width)" data-start="5442" data-end="5991">
<thead data-start="5442" data-end="5477">
<tr data-start="5442" data-end="5477">
<th data-start="5442" data-end="5458" data-col-size="sm"><strong data-start="5444" data-end="5457">Criterion</strong></th>
<th data-start="5458" data-end="5477" data-col-size="md"><strong data-start="5460" data-end="5475">Description</strong></th>
</tr>
</thead>
<tbody data-start="5515" data-end="5991">
<tr data-start="5515" data-end="5612">
<td data-start="5515" data-end="5545" data-col-size="sm"><strong data-start="5517" data-end="5544">Innovation & Creativity</strong></td>
<td data-col-size="md" data-start="5545" data-end="5612">Originality and novelty of cryptographic design or application.</td>
</tr>
<tr data-start="5613" data-end="5711">
<td data-start="5613" data-end="5657" data-col-size="sm"><strong data-start="5615" data-end="5656">Practical Application / Social Impact</strong></td>
<td data-start="5657" data-end="5711" data-col-size="md">Real-world relevance and implementation potential.</td>
</tr>
<tr data-start="5712" data-end="5817">
<td data-start="5712" data-end="5743" data-col-size="sm"><strong data-start="5714" data-end="5742">Technical Implementation</strong></td>
<td data-start="5743" data-end="5817" data-col-size="md">Depth, rigor, and correctness of the mathematical and technical model.</td>
</tr>
<tr data-start="5818" data-end="5907">
<td data-start="5818" data-end="5850" data-col-size="sm"><strong data-start="5820" data-end="5849">Scalability & Feasibility</strong></td>
<td data-col-size="md" data-start="5850" data-end="5907">Capability to extend and integrate into real systems.</td>
</tr>
<tr data-start="5908" data-end="5991">
<td data-start="5908" data-end="5935" data-col-size="sm"><strong data-start="5910" data-end="5934">Presentation Quality</strong></td>
<td data-col-size="md" data-start="5935" data-end="5991">Clarity of explanation, visualization, and teamwork.</td>
</tr>
</tbody>
</table>
</div>
</div>
<hr data-start="5993" data-end="5996" />
<h5 data-start="5998" data-end="6029"><strong data-start="6002" data-end="6029">6] Prizes & Recognition</strong></h5>
<ul data-start="6031" data-end="6977">
<li data-start="6031" data-end="6161">
<p data-start="6033" data-end="6161"><strong data-start="6033" data-end="6058">Top 10 Winning Teams:</strong><br data-start="6058" data-end="6061" />Receive <strong data-start="6071" data-end="6101">USD 1000 worth of vouchers</strong> under the <em data-start="6112" data-end="6138">“Idea to Startup Scheme”</em> by <strong data-start="6142" data-end="6158">SUKISH GROUP</strong>.</p>
</li>
<li data-start="6163" data-end="6563">
<p data-start="6165" data-end="6296"><strong data-start="6165" data-end="6181">Top 3 Teams:</strong><br data-start="6181" data-end="6184" />Ideas will be recommended for <strong data-start="6216" data-end="6232">seed funding</strong> to the following leading companies and research institutions:</p>
<ol data-start="6299" data-end="6563">
<li data-start="6299" data-end="6344">
<p data-start="6302" data-end="6344"><strong data-start="6302" data-end="6342">IBM Research – Cryptography Division</strong></p>
</li>
<li data-start="6347" data-end="6377">
<p data-start="6350" data-end="6377"><strong data-start="6350" data-end="6375">Google Quantum AI Lab</strong></p>
</li>
<li data-start="6380" data-end="6439">
<p data-start="6383" data-end="6439"><strong data-start="6383" data-end="6437">Microsoft Research – Security & Cryptography Group</strong></p>
</li>
<li data-start="6442" data-end="6504">
<p data-start="6445" data-end="6504"><strong data-start="6445" data-end="6502">National Institute of Standards and Technology (NIST)</strong></p>
</li>
<li data-start="6507" data-end="6563">
<p data-start="6510" data-end="6563"><strong data-start="6510" data-end="6561">European Union Agency for Cybersecurity (ENISA)</strong></p>
</li>
</ol>
</li>
<li data-start="6565" data-end="6644">
<p data-start="6567" data-end="6644"><strong data-start="6567" data-end="6584">Certificates:</strong> All participants receive E-certificates of participation.</p>
</li>
<li data-start="6645" data-end="6736">
<p data-start="6647" data-end="6736"><strong data-start="6647" data-end="6666">Special Awards:</strong> <em data-start="6667" data-end="6686">Innovation Awards</em> during <strong data-start="6694" data-end="6733">MU International Awards 2026 Series</strong>.</p>
</li>
<li data-start="6737" data-end="6887">
<p data-start="6739" data-end="6887"><strong data-start="6739" data-end="6764">Showcase Opportunity:</strong> Winning teams can present at the <strong data-start="6798" data-end="6884">MU International Conference on Cybersecurity, Mathematics, and Information Systems</strong>.</p>
</li>
<li data-start="6888" data-end="6977">
<p data-start="6890" data-end="6977"><strong data-start="6890" data-end="6906">Publication:</strong> Selected ideas will be abstracted in the <strong data-start="6948" data-end="6976">MU International Journal</strong>.</p>
</li>
</ul>
<hr data-start="6979" data-end="6982" />
<h5 data-start="6984" data-end="7015"><strong data-start="6988" data-end="7015">7] Registration Section</strong></h5>
<ul data-start="7017" data-end="7263">
<li data-start="7017" data-end="7121">
<p data-start="7019" data-end="7121"><strong data-start="7019" data-end="7047">Indian Team (4 Members):</strong> ₹499<br data-start="7052" data-end="7055" />👉 <a class="decorated-link" href="https://rzp.io/rzp/4JM7ux4N" target="_new" rel="noopener" data-start="7060" data-end="7119">Register Here (Indian Teams)</a></p>
</li>
<li data-start="7122" data-end="7263">
<p data-start="7124" data-end="7263"><strong data-start="7124" data-end="7159">International Team (4 Members):</strong> USD 50<br data-start="7166" data-end="7169" />👉 <a class="decorated-link" href="https://www.paypal.com/ncp/payment/3ZZAY2H3ZDMBS" target="_new" rel="noopener" data-start="7174" data-end="7261">Register Here (International Teams)</a></p>
</li>
</ul>
<p data-start="7265" data-end="7321">📅 <strong data-start="7268" data-end="7298">Deadline for Registration:</strong> <strong data-start="7299" data-end="7321">September 12, 2026</strong></p>
<hr data-start="7323" data-end="7326" />
<h5 data-start="7328" data-end="7358"><strong data-start="7332" data-end="7358">8] Contact Information</strong></h5>
<p data-start="7360" data-end="7480">📧 <strong data-start="7363" data-end="7373">Email:</strong> <a class="decorated-link cursor-pointer" rel="noopener" data-start="7374" data-end="7397">contact@masteringup.com</a><br data-start="7397" data-end="7400" />🌐 <strong data-start="7403" data-end="7415">Website:</strong> <a class="decorated-link" href="https://www.masteringup.com/events" target="_new" rel="noopener" data-start="7416" data-end="7480">www.masteringup.com/events</a></p>