SlideShare une entreprise Scribd logo
1  sur  53
Cryptography
“ You can’t make something secure if you
don’t know how to break it”
- Marc Weber Tobias
Definition
• Cryptography is the science of
disguising messages so that only the
intended recipient can decipher the
received message.
• Secret Writing
Scenario
Terminologies
• Plain text
• Cipher text
• Encryption
• Decryption
• Cryptanalysis
• Cryptology
• Encryption: c = Ee(p)
• Decryption: p = Dd(c)
• Here p is a block of plaintext,
c is a block of ciphertext,
E is the encryption function,
e is the encryption key,
D is the decryption function and
d is the decryption key.
Cryptography
Cryptanalysis
• Cryptography is the art and science of
creating secret codes.
• Cryptanalysis is the art and science of
breaking those code.
Cryptanalysis
Attack
Ciphertext
Only
Brute-Force
Statistical
Pattern
Known
Plaintext
Chosen-
Plaintext
Chosen-
Ciphertext
Crypto-
graphy
Crypt-
analysis
Cryptology
SymmetricCiphers
Substitution
Cipher
Mono-alphabetic
Polyalphabetic
Transposition
Cipher
Mono-alphabetic Cipher
• Additive / Caesar / Shift Cipher
• Multiplicative Cipher
• Affine Cipher
Caesar Cipher
Representation of
Character
Shift Cipher
• Encryption
o C=(P+K1) Mod 26
• Decryption
o P=(C-K1) Mod 26
https://www.youtube.com/watch?v=fEULLhEA4Vk
• The Additive cipher replaces each alphabet
in a text by the alphabet k positions away
(in the modulo 26 sense).
• For k = 3
W H A T I S Y O U R N A M E becomes
Z K D W L V BR X U Q D P H
Multiplicative Cipher
• Encryption
o C=(P * K1) Mod 26
• Decryption
o P=(C * K1
-1) Mod 26
Affine Cipher
• Combination of Additive and
Multiplicative
• Encryption
o C=(P * K1 + K2) Mod 26
• Decryption
o P=((C – K2 )* K1
-1) Mod 26
Cryptanalysis
• Brute-Force Attack
• Statistical Attack
• Frequency of Occurrence of
letters.(E,T,A,O,I,N,S,H,R,D……)
• Grouping of Di-gram (HE,IN,AN,IS...)
and Tri-grams (THE,ING,AND,HER…).
Poly-alphabetic Cipher
• Each occurrence of character may
have a different substitution.
• One to Many
• Vigenere Cipher , Play-fair Cipher, Hill
Cipher ,Vernam Cipher.
Vigenere Cipher
• Blaise de Vigenere, Mathematician
• Secret Key of length m (K1,K2.......,Km) is
required
• Key stream Not depend on plaintext
character.
• Encryption depends on the position of
character in the plaintext.
Example
• Plaintext : SHE IS LISTINING
• Key : PASCAL
• Cipher text : HHW KS WXSLGNTCG
Plaintext S H E I S L I S T I N I N G
P Values 18 07 04 08 18 11 08 18 19 04 13 08 13 06
K Values 15 00 18 02 00 11 15 05 08 02 00 11 05 00
C Values 07 07 22 10 18 22 23 23 11 06 13 19 02 06
Cipher text H H W K S W X X L G N T C G
Plaintext S H E I S L I S T I N I N G
P Values 18 07 04 08 18 11 08 18 19 04 13 08 13 06
K Values 15 00 18 02 00 11 15 00 08 02 00 11 05 00
C Values 07 07 22 10 18 22 23 18 11 06 13 19 02 06
Cipher text H H W K S W X S L G N T C G
Play-fair Cipher
• Used by British army during World war I
• Secret key made of 25 alphabet
arranged in 5*5 Matrix.
• Two step process
o Creation of matrix
o Encryption
Question (10 Marks)
Dec -2012
Solution
• Plaintext : SHE IS LISTINING
• Key : MORNING
M O R N I
G A B C D
E F H J K
L P Q S T
U V W X YZ
Solution
• SH EI SL IS TI NI NG
• SH = QJ
H J
Q S
Solution
• SH EI SL IS TI NI NG
• EI = KM
M O R N I
G A B C D
E F H J K
Solution
• SH EI SL IS TI NI NG
• SL (SAME ROW)= TP
L P Q S T
Solution
• SH EI SL IS TI NI NG
• IS = NT
• TI(SAME COLUMN) = YD
M O R N I
G A B C D
E F H J K
L P Q S T
U V W X YZ
Solution
• SH EI SL IS TI NI NG
• NI(SAME ROW) = IM
• NG = MC
M O R N I
G A B C D
E F H J K
L P Q S T
U V W X YZ
Hill Cipher
• Lester S. Hill
• Block Cipher
• Key is square matrix of order m*m
• Key Matrix need to have multiplicative
inverse.
• Difficult to break
Example
• Plain text = CAT
Encryption CAT = FIN
•
𝟐
𝟎
𝟏𝟗
×
𝟗 𝟐𝟒 𝟏
𝟏𝟑 𝟏𝟔 𝟏𝟎
𝟏 𝟏𝟎 𝟏𝟓
=
𝟑𝟏
𝟐𝟏𝟔
𝟐𝟑𝟓
𝑴𝒐𝒅 𝟐𝟔 =
𝟓
𝟖
𝟏𝟑
Decryption FIN = CAT
•
𝟓
𝟖
𝟏𝟑
×
𝟖 𝟓 𝟏𝟎
𝟐𝟏 𝟖 𝟐𝟏
𝟐𝟏 𝟏𝟐 𝟖
= 𝑴𝒐𝒅 𝟐𝟔 =
𝟐
𝟎
𝟏𝟗
One-Time Pad
• Vernam Cipher.
• Key used once can not be reused.
• Key length is equal to message length.
• Book cipher / Running Key cipher
Plaintext V E R N E M C I P H E R
Numeric Code 21 04 17 13 00 12 02 08 15 07 04 17
Key 76 48 06 82 44 03 58 11 60 05 48 88
Sum 97 52 33 95 44 15 60 19 75 12 52 105
Mod 26 19 00 07 17 18 15 08 19 23 12 00 01
Ciphertext T A H R S P I T X M A B
Book Cipher
• Running Key cipher.
Cipher
Block
Cipher
Polygram
Substitution
Stream
Cipher
Homophonic
Substitution
Transposition
• Permutation of position of Plaintext
alphabet.
• Rail Fence Technique
• Simple Columnar Transposition
• Simple Columnar Transposition with
Multiple Round
Cryptography
Encryption
Decryption
Cryptography
Create secret Code
• Encryption
o CT = Ek (PT)
• Decryption
o PT=Dk (CT) = Dk (Ek (PT))
Cryptography
• Input to the process
o Algorithm
o Key
Cryptography
Symmetric
Key
Asymmetric
Key
Symmetric Key
• Same key is used for encryption and
decryption of message.
• Key Exchange Problem
Diffie-Hellman Algorithm
1. Pick random, secret x
2. Compute A = gx mod n
3. Send A to Bob
4. K1 = Bx Mod n
1. Pick random, secret y
2. Compute B = gy mod n
3. Send B to Alice
4. K2 = Ay Mod n
Alice and Bob agree on two
prime number n and g
Diffie – Hellman
K1 = (gx mod n)y = gxy mod n K2 = (gy mod n)x = gxy mod n
• Let n = 11 and g = 7
• Let x = 3 and compute A
• Let y = 6 and compute B
• Calculate K1 and K2
Solution
1. N = 11 , g = 7
2. x = 3 then A = 73 Mod 11 = 2
3. y = 6 then B = 76 Mod 11 = 4
4. K1 = 43 Mod 11 = 9
5. K2 = 26 Mod 11 = 9
Problem with Algorithm
• Man in Middle attack
Asymmetric Key
Cryptology

Contenu connexe

Tendances (20)

Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
cryptography
cryptographycryptography
cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
Cryptography
CryptographyCryptography
Cryptography
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
Diffie Hellman Key Exchange
Diffie Hellman Key ExchangeDiffie Hellman Key Exchange
Diffie Hellman Key Exchange
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Transposition Cipher
Transposition CipherTransposition Cipher
Transposition Cipher
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Vigenere cipher
Vigenere cipherVigenere cipher
Vigenere cipher
 

En vedette

Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniquesMohd Arif
 
Information security
Information securityInformation security
Information securityMustahid Ali
 
Ciphers and codes
Ciphers and codesCiphers and codes
Ciphers and codesTedi Thug
 
Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?Yulian Slobodyan
 
Cryptology for security
Cryptology for securityCryptology for security
Cryptology for securityManish Kumar
 
04 brute force
04 brute force04 brute force
04 brute forceHira Gul
 
One time pad Encryption:
One time pad Encryption:One time pad Encryption:
One time pad Encryption:Asad Ali
 
One Time Pad Encryption Technique
One Time Pad Encryption TechniqueOne Time Pad Encryption Technique
One Time Pad Encryption TechniqueJohn Adams
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intrudersrajakhurram
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & SteganographyAnimesh Shaw
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3 WE-IT TUTORIALS
 

En vedette (20)

Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
Information security
Information securityInformation security
Information security
 
One Time Pad Journal
One Time Pad JournalOne Time Pad Journal
One Time Pad Journal
 
Ciphers and codes
Ciphers and codesCiphers and codes
Ciphers and codes
 
Ch02
Ch02Ch02
Ch02
 
Cryptography basices
Cryptography basicesCryptography basices
Cryptography basices
 
Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?
 
Cryptology for security
Cryptology for securityCryptology for security
Cryptology for security
 
One-Time Pad Encryption
One-Time Pad EncryptionOne-Time Pad Encryption
One-Time Pad Encryption
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
04 brute force
04 brute force04 brute force
04 brute force
 
One time pad Encryption:
One time pad Encryption:One time pad Encryption:
One time pad Encryption:
 
One Time Pad Encryption Technique
One Time Pad Encryption TechniqueOne Time Pad Encryption Technique
One Time Pad Encryption Technique
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
 

Similaire à Cryptology

EncryptionTechChap2.ppt
EncryptionTechChap2.pptEncryptionTechChap2.ppt
EncryptionTechChap2.pptrajirajesh8
 
Information security (Symmetric encryption, cryptography, crypto-analysis)
Information security (Symmetric encryption, cryptography, crypto-analysis)Information security (Symmetric encryption, cryptography, crypto-analysis)
Information security (Symmetric encryption, cryptography, crypto-analysis)Zara Nawaz
 
2 classical cryptosystems
2 classical cryptosystems2 classical cryptosystems
2 classical cryptosystemsdmc5abdulla
 
cryptography symmentric.pptx
cryptography symmentric.pptxcryptography symmentric.pptx
cryptography symmentric.pptxChethanKrishna14
 
3 Basics of Cryptography Basics of Cryptography
3 Basics of Cryptography  Basics of Cryptography3 Basics of Cryptography  Basics of Cryptography
3 Basics of Cryptography Basics of CryptographyMohammedMorhafJaely
 
Cryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxCryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxRobertCarreonBula
 
Cns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption TechniquesCns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption Techniquesbabak danyal
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Securitybabak danyal
 
Cs166 mynote
Cs166 mynoteCs166 mynote
Cs166 mynoteKaya Ota
 
Applications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipherApplications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipherAashirwad Kashyap
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesDr.Florence Dayana
 
Data Protection Techniques and Cryptography
Data Protection Techniques and CryptographyData Protection Techniques and Cryptography
Data Protection Techniques and CryptographyTalha SAVAS
 
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberSimple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberTarek Gaber
 
Classical Encryption Techniques.pdf
Classical Encryption Techniques.pdfClassical Encryption Techniques.pdf
Classical Encryption Techniques.pdfDevangShukla10
 
Vigenere Cipher computer security and network.pptx
Vigenere Cipher computer security and network.pptxVigenere Cipher computer security and network.pptx
Vigenere Cipher computer security and network.pptxpeter1097
 

Similaire à Cryptology (20)

EncryptionTechChap2.ppt
EncryptionTechChap2.pptEncryptionTechChap2.ppt
EncryptionTechChap2.ppt
 
module 1 (part A).pdf
module 1 (part A).pdfmodule 1 (part A).pdf
module 1 (part A).pdf
 
Information security (Symmetric encryption, cryptography, crypto-analysis)
Information security (Symmetric encryption, cryptography, crypto-analysis)Information security (Symmetric encryption, cryptography, crypto-analysis)
Information security (Symmetric encryption, cryptography, crypto-analysis)
 
2 classical cryptosystems
2 classical cryptosystems2 classical cryptosystems
2 classical cryptosystems
 
cryptography symmentric.pptx
cryptography symmentric.pptxcryptography symmentric.pptx
cryptography symmentric.pptx
 
Modern Cryptography
Modern CryptographyModern Cryptography
Modern Cryptography
 
3 Basics of Cryptography Basics of Cryptography
3 Basics of Cryptography  Basics of Cryptography3 Basics of Cryptography  Basics of Cryptography
3 Basics of Cryptography Basics of Cryptography
 
Cryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxCryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptx
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
Cns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption TechniquesCns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption Techniques
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
Cs166 mynote
Cs166 mynoteCs166 mynote
Cs166 mynote
 
Applications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipherApplications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipher
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Data Protection Techniques and Cryptography
Data Protection Techniques and CryptographyData Protection Techniques and Cryptography
Data Protection Techniques and Cryptography
 
Network security CS2
Network security CS2Network security CS2
Network security CS2
 
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberSimple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
 
Classical Encryption Techniques.pdf
Classical Encryption Techniques.pdfClassical Encryption Techniques.pdf
Classical Encryption Techniques.pdf
 
Vigenere Cipher computer security and network.pptx
Vigenere Cipher computer security and network.pptxVigenere Cipher computer security and network.pptx
Vigenere Cipher computer security and network.pptx
 
Class3
Class3Class3
Class3
 

Plus de Rupesh Mishra

Plus de Rupesh Mishra (6)

Cloud Computing - Introduction
Cloud Computing - IntroductionCloud Computing - Introduction
Cloud Computing - Introduction
 
Computer Graphics - Output Primitive
Computer Graphics - Output PrimitiveComputer Graphics - Output Primitive
Computer Graphics - Output Primitive
 
Structure & union
Structure & unionStructure & union
Structure & union
 
Ipsec
IpsecIpsec
Ipsec
 
Modern symmetric cipher
Modern symmetric cipherModern symmetric cipher
Modern symmetric cipher
 
Security
SecuritySecurity
Security
 

Dernier

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Dernier (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Cryptology

Notes de l'éditeur

  1. Breaking Code
  2. KAISISKI TEST IS USED TO BREAK THE CODE
  3. Pattern Attack is Possible 25! Ways if applying Brute-force attack
  4. Making Code