SlideShare ist ein Scribd-Unternehmen logo
1 von 30
IT346 Information
System Security

Week 3-1: Symmetric-Key
Cryptography

Faculty of Information Technology

Page

1
Cryptography
 Cryptography

graph

crypto

“
 Cryptography

Cryptography
”
3

‣ Symmetric Key Cryptography

Key Cryptography

‣ Asymmetric Key Cryptography

Key Cryptography

Faculty of Information Technology

Secret
Public
Page
Cryptography
 Cryptanalysis

Cryptography
 Sensitive Data

Faculty of Information Technology

Page
Symmetric-Key
Cryptography
 Plaintext –
 Encryption algorithm –

(substitutions)
(transformations)
plaintext
 Secret Key –
substitutions/transformations
encryption
 Ciphertext –
substitutions/transformations
Key
Key
 Decryption –
Plaintext
Ciphertext
encryption
Encryp
Decryp

tion C encryption  P
tion
E(P,K) 
D(C,K)
key

Faculty of Information Technology

Plaintex

Page


DES (Data Encryption
Standard)
‣ Key size 56 bits

3-DES (Triple-DES)



‣ Key size 112 bits



IDEA (International Data
Encryption Algorithm)
‣ Key size 128 bits



AES (Advanced Encryption
Standard)
‣ Key size 128, 192, 256 bits

Faculty of Information Technology

Page

5
DES Algorithm
 DES

Data Encryption

Standard
(Block cipher)
Lucifer
IBM

Lucifer

DES
US NIST (US
National Institute of Standards and
Technology)
 DES
Faculty of Information Technology

(Block
Page

6
DES Overview
64-bit Plaintext
…

64-bit Key

Initial Permutation

PC1

64 bit

Round 0
64 bit

Round 1

…

K1

48 bit

K2

48 bit

56 bit
PC2
PC2

Left Circular Shift
56 bit

64 bit

Round 15

56-bit Key

56-bit Key
Left Circular Shift

56-bit Key
K16

48 bit

PC2

56 bit

Left Circular Shift

64 bit

32-bit Swap
64 bit
Inverse Initial Permutation

…
64-bit Ciphertext
Faculty of Information Technology

Page

7
DES Overview


Data Block

1)Data Block

(IP)
2)Data Block

DES Algorithm
bits
Initial Permutation

16
(substitution)
(permutation)
key
3)Data Block
4)Data Block

Permutation


Key Block

Faculty of Information Technology

48 bits

Inverse Initial

DES Algorithm
Page

8
Data Block Data Block

16

Round 0

64-bit
L0 (32 bits)

R0 (32 bits)

f

K1

XOR

Round 1

L1=R0

R1=(L0 XOR f(R0,K1))

f

K2

XOR

L2=R3

Faculty of Information Technology

R2=(L1 XOR f(R1,K2))

Page

9
Data Block


K


f(Ri,Ki-1)


Faculty of Information Technology

f

(Round 0 – 15)
(Ri)
bits
f(Ri,Ki-1)
(Li)
XOR

XOR
(Ri+1)
(Ri)
(Li+1)

Page

10
Data f
Block


(Ri)

f
bits

bits

key


Key

bits
bits

XOR
bits
(substitution)

bits


(Permutation)
Faculty of Information Technology

Page

11
Data Block


f
S-box

f

8
map
6 bits
4 bits
S(18 09 12 3d 11 17 38 39) =
5fd25e03

Faculty of Information Technology

Page

12
Data Block

Faculty of Information Technology

Page

13
Key

Block


subkeys

DES

key
initial permutation (Permutation Choice
1, PC1)
56bits
2
28bit
‣
16
:
‣

•
•

Faculty of Information Technology

28 bit
1
2
key rotation schedule
24 bits
PC2
data block
Page

14
DES Decryption
(decryption)



Block Cipher


DES

(encryption)

(decryption)
(encryption)

subkeys (K1 … K16)


Hardware
Faculty of Information Technology

decryption
subkeys

Encryption
K16 … K1

Page

15
DES Decryption
 DES decryption

Encryption
‣

‣
‣
‣
‣

DES

Initial Permutation
decryption
Inverse Initial Permutation
encryption
Round 0
K16
Round
encryption
….
Round 15
K1
Round
encryption
Inverse Initial Permutation
decryption

Faculty of Information Technology

Page

16
Avalanche Effect
 Avalanche Effect


 DES

Faculty of Information Technology

encryption algorithm
input
key
bit
bits
output
Avalanche Effect

Page

17
Strength of DES –
Key Size
 Key

56-bit
256 = 7.2 x 1016

brute force search

brute
DES Algorithm



force search
1997
Internet
‣
1998
‣

‣

key

Distribution.net
EFF

hardware

1999 Distribution.net

Faculty of Information Technology

EFF
Page

18
DES



bits
‣

Key

DES

DES
Bit



crack

bits
crack
DES

bit

Bit

DES

DES

Triple-DES ( DES)

Faculty of Information Technology

Page

19
Triple-DES (3DES) with
Two-Keys
 Triple-DES

DES

DES

DES



key



‣



Triple-

Faculty of Information Technology

C = EK1(DK2(EK1(P)))
Encryption
Encrypt-Decrypt-Encrypt

K1 = K2

DES

Triple-DES

Page

20
Triple-DES (3DES) with
Two-Keys


Key

Encryption

3DES

64-bit Plaintext

DES Encryption

Key 1

DES Decryption

Key 2

DES Encryption

Key 1

64-bit Ciphertext
Faculty of Information Technology

Page

21
AES (Advance
Encryption Standard)
 AES (Advance Encryption Standard)
AES


DES

break

NIST
data block

DES

NIST
bit




Faculty of Information Technology

Rijndael
Page

22
AES
 AES

Bytes

 Data Block
bits = 16 bytes
‣
Data Block 16 bytes
x
4
‣
bytes
Current State
out
in in in in
s s s
s s s s bytesout out out
‣ Current State s
0

4

8

12

0,0

0,1

0,2

0,3

0,0

0,1

0,2

0,3

in1 in5 in9 in13

s10 s1,1 s1,2 s1,3

s10 s1,1 s1,2 s1,3

in2 in6 in10 in14

s2,0 s2,1 s2,2 s2,3

s2,0 s2,1 s2,2 s2,3

in3 in7 in11 in15

s3,0 s3,1 s3,2 s3,3

s3,0 s3,1 s3,2 s3,3

State
ciphertext
input
State Array
encryption

Faculty of Information Technology

0

4

8

12

out1 out5 out9 out13

Current

out2 out6 out10 out14
out3 out7 out11 out15

output
Page

23
AES
bits

= 16 bytes

Key Block 16 bytes

‣

x4

‣ Key

k4

k8 k12

k1

k5

k9 k13

k2

 Key Block

k0

k6 k10 k14

k3

k7 k11 k15

w0 w1 w2 w3

(Key

Expansion)

f

+ + + +
w4 w5 w6 w7

word

44 words
k k k k
(1kword = 32 bits = 4
k
k k
w w
bytes)k
k k k

Key Expansion

Key Expansion

0

4

8

12

1

5

9

13

0

2

k3

6

10

1

…

w43

14

k7 k11 k15

Faculty of Information Technology

Page

24
AES
AES
(Initial Round)



AddRoundKey

‣

(Rounds)


‣

SubBytes, ShiftRows, MixColumns
AddRoundKey

(Final Rounds)


‣



Faculty of Information Technology

SubBytes, ShiftRows
AddRoundKey (
MixColumns)

round key (sub-key

Page

25
AES (Initial Round)
(Rounds)

(Final Round)
Mix Columns

Faculty of Information Technology

Page

26
AES
AddRoundKey



XOR
round

‣
‣

key

Key
words
= 16 bytes

w
Faculty of Information Technology

Page

27
AES
SubBytes


‣

non-linear substitution
lookup table

‣

Faculty of Information Technology

Page

28
AES
ShiftRows


‣

,3
‣

Faculty of Information Technology

Page

29
AES
MixColumns


‣
‣

Faculty of Information Technology

Page

30

Weitere ähnliche Inhalte

Was ist angesagt?

To the networks rfwkidea32 16, 32-8, 32-4, 32-2 and rfwkidea32-1, based on th...
To the networks rfwkidea32 16, 32-8, 32-4, 32-2 and rfwkidea32-1, based on th...To the networks rfwkidea32 16, 32-8, 32-4, 32-2 and rfwkidea32-1, based on th...
To the networks rfwkidea32 16, 32-8, 32-4, 32-2 and rfwkidea32-1, based on th...ijcisjournal
 
Consensus in Polkadot - 20190624
Consensus in Polkadot - 20190624Consensus in Polkadot - 20190624
Consensus in Polkadot - 20190624Joe Petrowski
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)SAurabh PRajapati
 
AES effecitve software implementation
AES effecitve software implementationAES effecitve software implementation
AES effecitve software implementationRoman Oliynykov
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption StandardPrince Rachit
 
ASIC Implementation of Triple Data Encryption Algorithm (3DES)
ASIC Implementation of Triple Data Encryption Algorithm (3DES)ASIC Implementation of Triple Data Encryption Algorithm (3DES)
ASIC Implementation of Triple Data Encryption Algorithm (3DES)Kevin Xiao Xiao
 
Chapter 3-block-cipher-des1
Chapter 3-block-cipher-des1Chapter 3-block-cipher-des1
Chapter 3-block-cipher-des1Shiraz316
 
CNIT 141 8. Public-Key Cryptosystems Based on the DLP
CNIT 141 8. Public-Key Cryptosystems Based on the DLPCNIT 141 8. Public-Key Cryptosystems Based on the DLP
CNIT 141 8. Public-Key Cryptosystems Based on the DLPSam Bowne
 
Next generation block ciphers
Next generation block ciphersNext generation block ciphers
Next generation block ciphersRoman Oliynykov
 
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Ahmed Mohamed Mahmoud
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption StandardAdri Jovin
 
CNIT 141: 9. Elliptic Curve Cryptosystems
CNIT 141: 9. Elliptic Curve CryptosystemsCNIT 141: 9. Elliptic Curve Cryptosystems
CNIT 141: 9. Elliptic Curve CryptosystemsSam Bowne
 
CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2
CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2
CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2Sam Bowne
 

Was ist angesagt? (20)

To the networks rfwkidea32 16, 32-8, 32-4, 32-2 and rfwkidea32-1, based on th...
To the networks rfwkidea32 16, 32-8, 32-4, 32-2 and rfwkidea32-1, based on th...To the networks rfwkidea32 16, 32-8, 32-4, 32-2 and rfwkidea32-1, based on th...
To the networks rfwkidea32 16, 32-8, 32-4, 32-2 and rfwkidea32-1, based on th...
 
Des
DesDes
Des
 
Consensus in Polkadot - 20190624
Consensus in Polkadot - 20190624Consensus in Polkadot - 20190624
Consensus in Polkadot - 20190624
 
Symmetric
SymmetricSymmetric
Symmetric
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)
 
AES effecitve software implementation
AES effecitve software implementationAES effecitve software implementation
AES effecitve software implementation
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
ASIC Implementation of Triple Data Encryption Algorithm (3DES)
ASIC Implementation of Triple Data Encryption Algorithm (3DES)ASIC Implementation of Triple Data Encryption Algorithm (3DES)
ASIC Implementation of Triple Data Encryption Algorithm (3DES)
 
Aes
AesAes
Aes
 
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key CiphersCRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
 
Chapter 3-block-cipher-des1
Chapter 3-block-cipher-des1Chapter 3-block-cipher-des1
Chapter 3-block-cipher-des1
 
CNIT 141 8. Public-Key Cryptosystems Based on the DLP
CNIT 141 8. Public-Key Cryptosystems Based on the DLPCNIT 141 8. Public-Key Cryptosystems Based on the DLP
CNIT 141 8. Public-Key Cryptosystems Based on the DLP
 
Next generation block ciphers
Next generation block ciphersNext generation block ciphers
Next generation block ciphers
 
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)
 
AES Cryptosystem
AES CryptosystemAES Cryptosystem
AES Cryptosystem
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
Introducing an Encryption Algorithm based on IDEA
Introducing an Encryption Algorithm based on IDEAIntroducing an Encryption Algorithm based on IDEA
Introducing an Encryption Algorithm based on IDEA
 
CNIT 141: 9. Elliptic Curve Cryptosystems
CNIT 141: 9. Elliptic Curve CryptosystemsCNIT 141: 9. Elliptic Curve Cryptosystems
CNIT 141: 9. Elliptic Curve Cryptosystems
 
Cyber security
Cyber securityCyber security
Cyber security
 
CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2
CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2
CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2
 

Ähnlich wie Information system security wk3-1

Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Hardik Manocha
 
Design and Simulation Triple-DES
Design and Simulation Triple-DESDesign and Simulation Triple-DES
Design and Simulation Triple-DESchatsiri
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption StandardAmirul Wiramuda
 
secure file storage on cloud using hybrid Cryptography ppt.pptx
secure file storage on cloud using hybrid Cryptography  ppt.pptxsecure file storage on cloud using hybrid Cryptography  ppt.pptx
secure file storage on cloud using hybrid Cryptography ppt.pptxNishmithaHc
 
secure file Storage on cloud ppt
secure file Storage on cloud pptsecure file Storage on cloud ppt
secure file Storage on cloud pptNishmithaHc
 
Password based encryption
Password based encryptionPassword based encryption
Password based encryptionSachin Tripathi
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithmsijsrd.com
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network SecurityDr. Rupa Ch
 
Renas Rajab Asaad
Renas Rajab Asaad Renas Rajab Asaad
Renas Rajab Asaad Renas Rekany
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityNagendra Um
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptographysubhradeep mitra
 
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxAdvanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxHardik Manocha
 

Ähnlich wie Information system security wk3-1 (20)

Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
 
Blockchain Technology - Week 9 - Blockciphers
Blockchain Technology - Week 9 - BlockciphersBlockchain Technology - Week 9 - Blockciphers
Blockchain Technology - Week 9 - Blockciphers
 
Design and Simulation Triple-DES
Design and Simulation Triple-DESDesign and Simulation Triple-DES
Design and Simulation Triple-DES
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
secure file storage on cloud using hybrid Cryptography ppt.pptx
secure file storage on cloud using hybrid Cryptography  ppt.pptxsecure file storage on cloud using hybrid Cryptography  ppt.pptx
secure file storage on cloud using hybrid Cryptography ppt.pptx
 
secure file Storage on cloud ppt
secure file Storage on cloud pptsecure file Storage on cloud ppt
secure file Storage on cloud ppt
 
DES
DESDES
DES
 
Password based encryption
Password based encryptionPassword based encryption
Password based encryption
 
Network security
Network securityNetwork security
Network security
 
4255596.ppt
4255596.ppt4255596.ppt
4255596.ppt
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithms
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network Security
 
Renas Rajab Asaad
Renas Rajab Asaad Renas Rajab Asaad
Renas Rajab Asaad
 
G04701051058
G04701051058G04701051058
G04701051058
 
section-8.ppt
section-8.pptsection-8.ppt
section-8.ppt
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxAdvanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution Box
 

Mehr von Bee Lalita

Information system security wk7-1-ids-ips
Information system security wk7-1-ids-ipsInformation system security wk7-1-ids-ips
Information system security wk7-1-ids-ipsBee Lalita
 
Information system security wk6-2
Information system security wk6-2Information system security wk6-2
Information system security wk6-2Bee Lalita
 
Information system security wk6-2
Information system security wk6-2Information system security wk6-2
Information system security wk6-2Bee Lalita
 
Information system security wk6-1
Information system security wk6-1Information system security wk6-1
Information system security wk6-1Bee Lalita
 
Information system security wk5-2-authentication
Information system security wk5-2-authenticationInformation system security wk5-2-authentication
Information system security wk5-2-authenticationBee Lalita
 
Information system security wk5-1-pki
Information system security wk5-1-pkiInformation system security wk5-1-pki
Information system security wk5-1-pkiBee Lalita
 
Information system security wk5-1-pki
Information system security wk5-1-pkiInformation system security wk5-1-pki
Information system security wk5-1-pkiBee Lalita
 
Information system security wk4-2
Information system security wk4-2Information system security wk4-2
Information system security wk4-2Bee Lalita
 
Information system security wk4-1
Information system security wk4-1Information system security wk4-1
Information system security wk4-1Bee Lalita
 
Information system security wk3-2
Information system security wk3-2Information system security wk3-2
Information system security wk3-2Bee Lalita
 
Information system security wk7-2-ids-ips_2
Information system security wk7-2-ids-ips_2Information system security wk7-2-ids-ips_2
Information system security wk7-2-ids-ips_2Bee Lalita
 
Information system security wk1-1
Information system security wk1-1Information system security wk1-1
Information system security wk1-1Bee Lalita
 

Mehr von Bee Lalita (12)

Information system security wk7-1-ids-ips
Information system security wk7-1-ids-ipsInformation system security wk7-1-ids-ips
Information system security wk7-1-ids-ips
 
Information system security wk6-2
Information system security wk6-2Information system security wk6-2
Information system security wk6-2
 
Information system security wk6-2
Information system security wk6-2Information system security wk6-2
Information system security wk6-2
 
Information system security wk6-1
Information system security wk6-1Information system security wk6-1
Information system security wk6-1
 
Information system security wk5-2-authentication
Information system security wk5-2-authenticationInformation system security wk5-2-authentication
Information system security wk5-2-authentication
 
Information system security wk5-1-pki
Information system security wk5-1-pkiInformation system security wk5-1-pki
Information system security wk5-1-pki
 
Information system security wk5-1-pki
Information system security wk5-1-pkiInformation system security wk5-1-pki
Information system security wk5-1-pki
 
Information system security wk4-2
Information system security wk4-2Information system security wk4-2
Information system security wk4-2
 
Information system security wk4-1
Information system security wk4-1Information system security wk4-1
Information system security wk4-1
 
Information system security wk3-2
Information system security wk3-2Information system security wk3-2
Information system security wk3-2
 
Information system security wk7-2-ids-ips_2
Information system security wk7-2-ids-ips_2Information system security wk7-2-ids-ips_2
Information system security wk7-2-ids-ips_2
 
Information system security wk1-1
Information system security wk1-1Information system security wk1-1
Information system security wk1-1
 

Kürzlich hochgeladen

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 

Kürzlich hochgeladen (20)

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 

Information system security wk3-1