{"id":104,"date":"2023-01-27T22:10:28","date_gmt":"2023-01-28T05:10:28","guid":{"rendered":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/?p=104"},"modified":"2023-01-30T13:40:06","modified_gmt":"2023-01-30T20:40:06","slug":"crypto-jeopardy","status":"publish","type":"post","link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2023\/01\/27\/crypto-jeopardy\/","title":{"rendered":"Decentralized Dilemmas: A Blockchain Jeopardy Challenge"},"content":{"rendered":"\n<p>Group: Angelica Hizsa, Teddy Kalp, Lisa Muli<\/p>\n\n\n\n<p>The practice of securing communication by transforming plaintext into unreadable ciphertext, and vice versa, using mathematical algorithms and secret keys&#8230;What is Cryptography?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Introduction<\/h2>\n\n\n\n<p>So\u2026 Let\u2019s talk about the exciting world of Cryptography, demystify the belief of its complexity, build on fundamental knowledge and challenge you to learn more about the fundamental, objectives, uses, methods and even humor regarding cryptography.  How about we make a game of it and test your knowledge as you attempt to gain the highest score, in a game of Jeopardy. Each round will have category specific questions in the form of statements and answers required in the form of questions. Are you up for the challenge? What if we make it even more interesting and specialize the game to see how much you know about blockchains?&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/time-knowledge-jeopardy-thegentlemansarmchair-980860.jpeg\" alt=\"\" class=\"wp-image-122 lazyload\" width=\"965\" height=\"353\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/time-knowledge-jeopardy-thegentlemansarmchair-980860.jpeg 811w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/time-knowledge-jeopardy-thegentlemansarmchair-980860-300x110.jpeg 300w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/time-knowledge-jeopardy-thegentlemansarmchair-980860-768x281.jpeg 768w\" data-sizes=\"(max-width: 965px) 100vw, 965px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 965px; --smush-placeholder-aspect-ratio: 965\/353;\" \/><figcaption class=\"wp-element-caption\">Crypto Jeopardy: study for it on the toilet?<\/figcaption><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\">Blockchain of Trust<\/h2>\n\n\n\n<p>So why did we select blockchain as the specialty topic for our Jeopardy game? Blockchain technology is a revolutionary new way of storing and transferring data that is quickly gaining traction in a wide range of industries. At its core, blockchain combines cryptographic techniques and a decentralized architecture to provide three key features: confidentiality, integrity, and availability (CIA Triad). <\/p>\n\n\n\n<p>Confidentiality is maintained through the use of public-key cryptography. Each participant in the blockchain network has a unique pair of keys, one public and one private. The public key is used to encrypt data, while the private key is used to decrypt it. This ensures that only authorized parties can access the information stored on the blockchain.<\/p>\n\n\n\n<p>Integrity is maintained by using a hash function to create a unique digital fingerprint of each block in the chain. This fingerprint, or hash, is based on the data contained in the block and the hash of the previous block in the chain. This creates a tamper-evident chain that ensures that the data stored on the blockchain is valid and has not been altered. Additionally, a consensus mechanism is used to ensure that only valid transactions are added to the blockchain.<\/p>\n\n\n\n<p>Finally, availability is provided by the decentralized nature of the blockchain. The public ledger is spread across multiple nodes in the network, ensuring that the network can continue to function and the data remains accessible even if one node goes offline. This also ensures that there is no single point of failure in the system, making it highly resilient and redundant.<\/p>\n\n\n\n<p>For our project, we not only want to test out the knowledge of these foundations but also integrate some of the most interesting use cases for Blockchains and the type of material that will be found in the game<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Decentralization<\/strong>: The distributed nature of blockchain technology, where transactions are recorded across multiple nodes on a network, consequently eliminating the need for a central authority or intermediary.<\/li>\n\n\n\n<li><strong>Consensus algorithms:<\/strong> The mechanisms by which the network reaches agreement on the state of the blockchain. Common examples include: Proof of Work, Proof of Stake, Proof of Authority<\/li>\n\n\n\n<li><strong>Smart Contracts: <\/strong>Self-executing contracts with the terms of the agreement directly written into lines of code and stored within blocks on the network.<\/li>\n\n\n\n<li><strong>Distributed Ledger Technology:<\/strong> A digital record-keeping system where multiple copies of a ledger are spread across a network of peers.<\/li>\n\n\n\n<li><strong>Cryptography: <\/strong>This is crypto jeopardy, isn&#8217;t it?<\/li>\n\n\n\n<li><strong>Tokenization: <\/strong>The process of creating a digital token, typically on a blockchain, that can represent a variety of assets. Most commonly known as the &#8220;NFTs&#8221; or as we like to call them &#8220;digital monkeys&#8221;<\/li>\n\n\n\n<li><strong>Privacy and Anonymity:<\/strong> Techniques that protect the identity and transactional data of individuals and organizations using the cryptographic techniques used in blockchain networks<\/li>\n<\/ol>\n\n\n\n<p>&#8230;..and many more, we don&#8217;t want to spoil the whole game for you.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/image-4-1024x1024.png\" alt=\"\" class=\"wp-image-132 lazyload\" width=\"542\" height=\"542\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/image-4-1024x1024.png 1024w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/image-4-300x300.png 300w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/image-4-150x150.png 150w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/image-4-768x768.png 768w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/image-4-600x600.png 600w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/image-4.png 1080w\" data-sizes=\"(max-width: 542px) 100vw, 542px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 542px; --smush-placeholder-aspect-ratio: 542\/542;\" \/><figcaption class=\"wp-element-caption\">Sometimes the hottest trend isn&#8217;t the right trend.<\/figcaption><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\">Jeopardy Style<\/h2>\n\n\n\n<p>To further elaborate, a programmable game was selected as research showed it is a promising teaching approach that aids in fostering student learning, as well has shown to be an effective learning tool. The main focus is to share in-depth knowledge with users through a point based incentive structure ideally aiding in the retention of information that may or may not aid in correctly answering further complex questions. The game audience and users are assumed to be students or scholars but can be enjoyed by anyone with an interest or base knowledge of Cryptography.&nbsp;<\/p>\n\n\n\n<p>Originally, there was no theme to convey the overall importance of Cryptography. The game had a multitude of random categories varying in topics all under the subject of cryptography. There was no shortage of research materials, but focus was lost, the game felt disorganized, and questions felt to be more complex. So a version theme was added, becoming the driver to questions, correlating categories sand overall giving the game a more focused feel. Now, with theme fundamental categories are present in addition to themed categorizes correlated to blockchain.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"344\" data-id=\"138\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/MicrosoftTeams-image-1-1024x344.png\" alt=\"\" class=\"wp-image-138 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/MicrosoftTeams-image-1-1024x344.png 1024w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/MicrosoftTeams-image-1-300x101.png 300w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/MicrosoftTeams-image-1-768x258.png 768w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/MicrosoftTeams-image-1.png 1115w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/344;\" \/><figcaption class=\"wp-element-caption\">Crypto Jeopardy may not be for everyone.<\/figcaption><\/figure>\n<\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Merkle Trees<\/h2>\n\n\n\n<p>In addition, we have also added a <strong>Merkle Tree<\/strong> as a means of validation to the game and demonstrating a crucial component of blockchains. A Merkle Tree is a type of data structure that is used to validate the integrity of data in a distributed system. It works by taking a set of data, such as the clues and answers to the questions in a jeopardy game, and creating a hash of each piece of data. These hashes are then combined in pairs to create a new set of hashes, and this process is repeated until a single hash, called the root hash, is generated. We have chosen the SHA256 hashing algorithm to continuously hash these values. Now we can use this root hash as a fingerprint of the entire set of data, and any changes to the data can be detected by comparing the root hash to a previously recorded value. Not only this, but we can validate that answers are correct to clue by checking the proof against the Merkle Tree.<\/p>\n\n\n\n<p>By implementing a Merkle Tree within our jeopardy game, it provides a way to ensure the integrity of the answers data and prevent malicious actors from tampering with it. This means that players can have confidence that the game is fair and that all players are playing on a level playing field.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"803\" height=\"359\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/Capture.jpg\" alt=\"\" class=\"wp-image-145 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/Capture.jpg 803w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/Capture-300x134.jpg 300w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/Capture-768x343.jpg 768w\" data-sizes=\"(max-width: 803px) 100vw, 803px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 803px; --smush-placeholder-aspect-ratio: 803\/359;\" \/><figcaption class=\"wp-element-caption\">Visualization of a Merkle Tree with 8 Data Points<\/figcaption><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\">Good Luck!<\/h2>\n\n\n\n<p>Remember that questions are category specific and the higher the points value the greater the complexity. Here\u2019s a sneak peak of your challenge:&nbsp;&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-video aligncenter\"><video height=\"1616\" style=\"aspect-ratio: 3022 \/ 1616;\" width=\"3022\" controls src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/Screen-Recording-2023-01-27-at-5.23.42-PM.mov\"><\/video><figcaption class=\"wp-element-caption\">The Merkle Tree is generated using the Clue and Answers<\/figcaption><\/figure>\n\n\n\n<p>The game is currently in <strong>alpha <\/strong>development and will come out on Feb 3rd, make sure to come and test your knowledge! <\/p>\n\n\n\n<p>Keep an eye out in the comments sections for the announcement of the release! We would also love suggestions from you, our peers, on what features you would like to see in this game. These can be cryptographically related or just something you are really keen on wanting to have in the game, all is welcome!<\/p>\n\n\n\n<p>Source Code: <strong><a href=\"https:\/\/github.com\/tkalp\/CryptoJeopardy\">https:\/\/github.com\/tkalp\/CryptoJeopardy<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Bibliography<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>T. Ali Syed, A. Alzahrani, S. Jan, M. S. Siddiqui, A. Nadeem and T. Alghamdi (2019), &#8220;A Comparative Analysis of Blockchain Architecture and its Applications: Problems and Recommendations,&#8221; in IEEE Access, vol. 7, pp. 176838-176869, 2019, doi: 10.1109\/ACCESS.2019.2957660.<\/li>\n\n\n\n<li>Justinia T. (2019) Blockchain Technologies: Opportunities for Solving Real-World Problems in Healthcare and Biomedical Sciences. Acta Inform Med. 2019 Dec;27(4):284-291. doi: 10.5455\/aim.2019.27.284-291. PMID: 32055097; PMCID: PMC7004292.<\/li>\n\n\n\n<li>Martinez, L., Gimenes, M., &amp; Lambert, E. (2022). Entertainment Video Games for Academic Learning: A Systematic Review.\u202f<em>Journal of Educational Computing Research<\/em>,\u202f<em>60<\/em>(5), 1083\u20131109.\u202f<a rel=\"noreferrer noopener\" href=\"https:\/\/doi.org\/10.1177\/07356331211053848\" target=\"_blank\">https:\/\/doi.org\/10.1177\/07356331211053848<\/a>&nbsp;<\/li>\n\n\n\n<li>Monrat, A. A., Schel\u00e9n, O., &amp; Andersson, K. (2019). A survey of blockchain from the perspectives of applications, challenges, and opportunities.&nbsp;<em>IEEE Access<\/em>,&nbsp;<em>7<\/em>, 117134-117151.<\/li>\n\n\n\n<li>Gamage, H. T. M., Weerasinghe, H. D., &amp; Dias, N. G. J. (2020). A survey on blockchain technology concepts, applications, and issues.&nbsp;<em>SN Computer Science<\/em>,&nbsp;<em>1<\/em>, 1-15.<\/li>\n\n\n\n<li>Yaga, D., Mell, P., Roby, N., &amp; Scarfone, K. (2019). Blockchain technology overview.&nbsp;<em>arXiv preprint arXiv:1906.11078<\/em>.<\/li>\n\n\n\n<li>Massey, J. L. (1986). Cryptography\u2014A selective survey.&nbsp;<em>Digital Communications<\/em>,&nbsp;<em>85<\/em>, 3-25.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Group: Angelica Hizsa, Teddy Kalp, Lisa Muli The practice of securing communication by transforming plaintext into unreadable ciphertext, and vice versa, using mathematical algorithms and secret keys&#8230;What is Cryptography? Introduction So\u2026 Let\u2019s talk about the exciting world of Cryptography, demystify the belief of its complexity, build on fundamental knowledge and challenge you to learn more &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2023\/01\/27\/crypto-jeopardy\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Decentralized Dilemmas: A Blockchain Jeopardy Challenge&#8221;<\/span><\/a><\/p>\n","protected":false},"author":579,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-104","post","type-post","status-publish","format-standard","hentry","category-uncategorized","entry"],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Teddy Kalp","author_link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/author\/teddy-kalp\/"},"_links":{"self":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/104","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/users\/579"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/comments?post=104"}],"version-history":[{"count":11,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/104\/revisions"}],"predecessor-version":[{"id":163,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/104\/revisions\/163"}],"wp:attachment":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/media?parent=104"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/categories?post=104"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/tags?post=104"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}