SlideShare ist ein Scribd-Unternehmen logo
1 von 53
Cryptography
“ You can’t make something secure if you
don’t know how to break it”
- Marc Weber Tobias
Definition
• Cryptography is the science of
disguising messages so that only the
intended recipient can decipher the
received message.
• Secret Writing
Scenario
Terminologies
• Plain text
• Cipher text
• Encryption
• Decryption
• Cryptanalysis
• Cryptology
• Encryption: c = Ee(p)
• Decryption: p = Dd(c)
• Here p is a block of plaintext,
c is a block of ciphertext,
E is the encryption function,
e is the encryption key,
D is the decryption function and
d is the decryption key.
Cryptography
Cryptanalysis
• Cryptography is the art and science of
creating secret codes.
• Cryptanalysis is the art and science of
breaking those code.
Cryptanalysis
Attack
Ciphertext
Only
Brute-Force
Statistical
Pattern
Known
Plaintext
Chosen-
Plaintext
Chosen-
Ciphertext
Crypto-
graphy
Crypt-
analysis
Cryptology
SymmetricCiphers
Substitution
Cipher
Mono-alphabetic
Polyalphabetic
Transposition
Cipher
Mono-alphabetic Cipher
• Additive / Caesar / Shift Cipher
• Multiplicative Cipher
• Affine Cipher
Caesar Cipher
Representation of
Character
Shift Cipher
• Encryption
o C=(P+K1) Mod 26
• Decryption
o P=(C-K1) Mod 26
https://www.youtube.com/watch?v=fEULLhEA4Vk
• The Additive cipher replaces each alphabet
in a text by the alphabet k positions away
(in the modulo 26 sense).
• For k = 3
W H A T I S Y O U R N A M E becomes
Z K D W L V BR X U Q D P H
Multiplicative Cipher
• Encryption
o C=(P * K1) Mod 26
• Decryption
o P=(C * K1
-1) Mod 26
Affine Cipher
• Combination of Additive and
Multiplicative
• Encryption
o C=(P * K1 + K2) Mod 26
• Decryption
o P=((C – K2 )* K1
-1) Mod 26
Cryptanalysis
• Brute-Force Attack
• Statistical Attack
• Frequency of Occurrence of
letters.(E,T,A,O,I,N,S,H,R,D……)
• Grouping of Di-gram (HE,IN,AN,IS...)
and Tri-grams (THE,ING,AND,HER…).
Poly-alphabetic Cipher
• Each occurrence of character may
have a different substitution.
• One to Many
• Vigenere Cipher , Play-fair Cipher, Hill
Cipher ,Vernam Cipher.
Vigenere Cipher
• Blaise de Vigenere, Mathematician
• Secret Key of length m (K1,K2.......,Km) is
required
• Key stream Not depend on plaintext
character.
• Encryption depends on the position of
character in the plaintext.
Example
• Plaintext : SHE IS LISTINING
• Key : PASCAL
• Cipher text : HHW KS WXSLGNTCG
Plaintext S H E I S L I S T I N I N G
P Values 18 07 04 08 18 11 08 18 19 04 13 08 13 06
K Values 15 00 18 02 00 11 15 05 08 02 00 11 05 00
C Values 07 07 22 10 18 22 23 23 11 06 13 19 02 06
Cipher text H H W K S W X X L G N T C G
Plaintext S H E I S L I S T I N I N G
P Values 18 07 04 08 18 11 08 18 19 04 13 08 13 06
K Values 15 00 18 02 00 11 15 00 08 02 00 11 05 00
C Values 07 07 22 10 18 22 23 18 11 06 13 19 02 06
Cipher text H H W K S W X S L G N T C G
Play-fair Cipher
• Used by British army during World war I
• Secret key made of 25 alphabet
arranged in 5*5 Matrix.
• Two step process
o Creation of matrix
o Encryption
Question (10 Marks)
Dec -2012
Solution
• Plaintext : SHE IS LISTINING
• Key : MORNING
M O R N I
G A B C D
E F H J K
L P Q S T
U V W X YZ
Solution
• SH EI SL IS TI NI NG
• SH = QJ
H J
Q S
Solution
• SH EI SL IS TI NI NG
• EI = KM
M O R N I
G A B C D
E F H J K
Solution
• SH EI SL IS TI NI NG
• SL (SAME ROW)= TP
L P Q S T
Solution
• SH EI SL IS TI NI NG
• IS = NT
• TI(SAME COLUMN) = YD
M O R N I
G A B C D
E F H J K
L P Q S T
U V W X YZ
Solution
• SH EI SL IS TI NI NG
• NI(SAME ROW) = IM
• NG = MC
M O R N I
G A B C D
E F H J K
L P Q S T
U V W X YZ
Hill Cipher
• Lester S. Hill
• Block Cipher
• Key is square matrix of order m*m
• Key Matrix need to have multiplicative
inverse.
• Difficult to break
Example
• Plain text = CAT
Encryption CAT = FIN
•
𝟐
𝟎
𝟏𝟗
×
𝟗 𝟐𝟒 𝟏
𝟏𝟑 𝟏𝟔 𝟏𝟎
𝟏 𝟏𝟎 𝟏𝟓
=
𝟑𝟏
𝟐𝟏𝟔
𝟐𝟑𝟓
𝑴𝒐𝒅 𝟐𝟔 =
𝟓
𝟖
𝟏𝟑
Decryption FIN = CAT
•
𝟓
𝟖
𝟏𝟑
×
𝟖 𝟓 𝟏𝟎
𝟐𝟏 𝟖 𝟐𝟏
𝟐𝟏 𝟏𝟐 𝟖
= 𝑴𝒐𝒅 𝟐𝟔 =
𝟐
𝟎
𝟏𝟗
One-Time Pad
• Vernam Cipher.
• Key used once can not be reused.
• Key length is equal to message length.
• Book cipher / Running Key cipher
Plaintext V E R N E M C I P H E R
Numeric Code 21 04 17 13 00 12 02 08 15 07 04 17
Key 76 48 06 82 44 03 58 11 60 05 48 88
Sum 97 52 33 95 44 15 60 19 75 12 52 105
Mod 26 19 00 07 17 18 15 08 19 23 12 00 01
Ciphertext T A H R S P I T X M A B
Book Cipher
• Running Key cipher.
Cipher
Block
Cipher
Polygram
Substitution
Stream
Cipher
Homophonic
Substitution
Transposition
• Permutation of position of Plaintext
alphabet.
• Rail Fence Technique
• Simple Columnar Transposition
• Simple Columnar Transposition with
Multiple Round
Cryptography
Encryption
Decryption
Cryptography
Create secret Code
• Encryption
o CT = Ek (PT)
• Decryption
o PT=Dk (CT) = Dk (Ek (PT))
Cryptography
• Input to the process
o Algorithm
o Key
Cryptography
Symmetric
Key
Asymmetric
Key
Symmetric Key
• Same key is used for encryption and
decryption of message.
• Key Exchange Problem
Diffie-Hellman Algorithm
1. Pick random, secret x
2. Compute A = gx mod n
3. Send A to Bob
4. K1 = Bx Mod n
1. Pick random, secret y
2. Compute B = gy mod n
3. Send B to Alice
4. K2 = Ay Mod n
Alice and Bob agree on two
prime number n and g
Diffie – Hellman
K1 = (gx mod n)y = gxy mod n K2 = (gy mod n)x = gxy mod n
• Let n = 11 and g = 7
• Let x = 3 and compute A
• Let y = 6 and compute B
• Calculate K1 and K2
Solution
1. N = 11 , g = 7
2. x = 3 then A = 73 Mod 11 = 2
3. y = 6 then B = 76 Mod 11 = 4
4. K1 = 43 Mod 11 = 9
5. K2 = 26 Mod 11 = 9
Problem with Algorithm
• Man in Middle attack
Asymmetric Key
Cryptology

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Transposition cipher
Transposition cipherTransposition cipher
Transposition cipher
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherCryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar Cipher
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Applied Cryptography
Applied CryptographyApplied Cryptography
Applied Cryptography
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
Cryptography with caesar Cipher
Cryptography with caesar CipherCryptography with caesar Cipher
Cryptography with caesar Cipher
 

Andere mochten auch

Cipher techniques
Cipher techniquesCipher techniques
Cipher techniquesMohd Arif
 
Information security
Information securityInformation security
Information securityMustahid Ali
 
Ciphers and codes
Ciphers and codesCiphers and codes
Ciphers and codesTedi Thug
 
Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?Yulian Slobodyan
 
Cryptology for security
Cryptology for securityCryptology for security
Cryptology for securityManish Kumar
 
04 brute force
04 brute force04 brute force
04 brute forceHira Gul
 
One time pad Encryption:
One time pad Encryption:One time pad Encryption:
One time pad Encryption:Asad Ali
 
One Time Pad Encryption Technique
One Time Pad Encryption TechniqueOne Time Pad Encryption Technique
One Time Pad Encryption TechniqueJohn Adams
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intrudersrajakhurram
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & SteganographyAnimesh Shaw
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3 WE-IT TUTORIALS
 

Andere mochten auch (20)

Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
Cryptography
CryptographyCryptography
Cryptography
 
Information security
Information securityInformation security
Information security
 
One Time Pad Journal
One Time Pad JournalOne Time Pad Journal
One Time Pad Journal
 
Ciphers and codes
Ciphers and codesCiphers and codes
Ciphers and codes
 
Ch02
Ch02Ch02
Ch02
 
Cryptography basices
Cryptography basicesCryptography basices
Cryptography basices
 
Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?
 
Cryptology for security
Cryptology for securityCryptology for security
Cryptology for security
 
One-Time Pad Encryption
One-Time Pad EncryptionOne-Time Pad Encryption
One-Time Pad Encryption
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
04 brute force
04 brute force04 brute force
04 brute force
 
One time pad Encryption:
One time pad Encryption:One time pad Encryption:
One time pad Encryption:
 
One Time Pad Encryption Technique
One Time Pad Encryption TechniqueOne Time Pad Encryption Technique
One Time Pad Encryption Technique
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
 

Ähnlich wie Cryptology

EncryptionTechChap2.ppt
EncryptionTechChap2.pptEncryptionTechChap2.ppt
EncryptionTechChap2.pptrajirajesh8
 
Information security (Symmetric encryption, cryptography, crypto-analysis)
Information security (Symmetric encryption, cryptography, crypto-analysis)Information security (Symmetric encryption, cryptography, crypto-analysis)
Information security (Symmetric encryption, cryptography, crypto-analysis)Zara Nawaz
 
2 classical cryptosystems
2 classical cryptosystems2 classical cryptosystems
2 classical cryptosystemsdmc5abdulla
 
cryptography symmentric.pptx
cryptography symmentric.pptxcryptography symmentric.pptx
cryptography symmentric.pptxChethanKrishna14
 
3 Basics of Cryptography Basics of Cryptography
3 Basics of Cryptography  Basics of Cryptography3 Basics of Cryptography  Basics of Cryptography
3 Basics of Cryptography Basics of CryptographyMohammedMorhafJaely
 
Cryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxCryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxRobertCarreonBula
 
Cns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption TechniquesCns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption Techniquesbabak danyal
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Securitybabak danyal
 
Cs166 mynote
Cs166 mynoteCs166 mynote
Cs166 mynoteKaya Ota
 
Applications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipherApplications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipherAashirwad Kashyap
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesDr.Florence Dayana
 
Data Protection Techniques and Cryptography
Data Protection Techniques and CryptographyData Protection Techniques and Cryptography
Data Protection Techniques and CryptographyTalha SAVAS
 
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberSimple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberTarek Gaber
 
Classical Encryption Techniques.pdf
Classical Encryption Techniques.pdfClassical Encryption Techniques.pdf
Classical Encryption Techniques.pdfDevangShukla10
 
Vigenere Cipher computer security and network.pptx
Vigenere Cipher computer security and network.pptxVigenere Cipher computer security and network.pptx
Vigenere Cipher computer security and network.pptxpeter1097
 

Ähnlich wie Cryptology (20)

EncryptionTechChap2.ppt
EncryptionTechChap2.pptEncryptionTechChap2.ppt
EncryptionTechChap2.ppt
 
module 1 (part A).pdf
module 1 (part A).pdfmodule 1 (part A).pdf
module 1 (part A).pdf
 
Information security (Symmetric encryption, cryptography, crypto-analysis)
Information security (Symmetric encryption, cryptography, crypto-analysis)Information security (Symmetric encryption, cryptography, crypto-analysis)
Information security (Symmetric encryption, cryptography, crypto-analysis)
 
2 classical cryptosystems
2 classical cryptosystems2 classical cryptosystems
2 classical cryptosystems
 
cryptography symmentric.pptx
cryptography symmentric.pptxcryptography symmentric.pptx
cryptography symmentric.pptx
 
Modern Cryptography
Modern CryptographyModern Cryptography
Modern Cryptography
 
3 Basics of Cryptography Basics of Cryptography
3 Basics of Cryptography  Basics of Cryptography3 Basics of Cryptography  Basics of Cryptography
3 Basics of Cryptography Basics of Cryptography
 
Cryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxCryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptx
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
Cns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption TechniquesCns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption Techniques
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
Cs166 mynote
Cs166 mynoteCs166 mynote
Cs166 mynote
 
Applications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipherApplications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipher
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Data Protection Techniques and Cryptography
Data Protection Techniques and CryptographyData Protection Techniques and Cryptography
Data Protection Techniques and Cryptography
 
Network security CS2
Network security CS2Network security CS2
Network security CS2
 
Cryptography
CryptographyCryptography
Cryptography
 
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberSimple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
 
Classical Encryption Techniques.pdf
Classical Encryption Techniques.pdfClassical Encryption Techniques.pdf
Classical Encryption Techniques.pdf
 
Vigenere Cipher computer security and network.pptx
Vigenere Cipher computer security and network.pptxVigenere Cipher computer security and network.pptx
Vigenere Cipher computer security and network.pptx
 

Mehr von Rupesh Mishra

Mehr von Rupesh Mishra (6)

Cloud Computing - Introduction
Cloud Computing - IntroductionCloud Computing - Introduction
Cloud Computing - Introduction
 
Computer Graphics - Output Primitive
Computer Graphics - Output PrimitiveComputer Graphics - Output Primitive
Computer Graphics - Output Primitive
 
Structure & union
Structure & unionStructure & union
Structure & union
 
Ipsec
IpsecIpsec
Ipsec
 
Modern symmetric cipher
Modern symmetric cipherModern symmetric cipher
Modern symmetric cipher
 
Security
SecuritySecurity
Security
 

Kürzlich hochgeladen

Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Kürzlich hochgeladen (20)

Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Cryptology

Hinweis der Redaktion

  1. Breaking Code
  2. KAISISKI TEST IS USED TO BREAK THE CODE
  3. Pattern Attack is Possible 25! Ways if applying Brute-force attack
  4. Making Code