SlideShare une entreprise Scribd logo
1  sur  21
1Solutions www.domain.com
Workshop #1
Inroduction to RSA
Cryptography
Cb_salah_salah@esi.dz
2Solutions www.domain.com
Introduction
3Solutions www.domain.comCb_salah_salah@esi.dz
Quantum
cryptography
03
02
01
Mathematical
cryptography
Mechanical
Cryptography
Cryptography Evolution
4Solutions www.domain.comCb_salah_salah@esi.dz
Terminology
Ciphertext
•Encryption
•Stéganography
Decryption
•Encode, decode
•Plaintext
•Key
•Cryptography
•Cryptanalysis
•Cryptology
5Solutions www.domain.com
Traditional Cryptography
6Solutions www.domain.comCb_salah_salah@esi.dz
History of cryptography
Transposition Cipher
It is another type of cipher where the
order of the alphabets in the plaintext
is rearranged to create the ciphertext.
The actual plaintext alphabets are not
replaced.
Playfair Cipher
In this scheme, pairs of letters are encrypted,
instead of single letters as in the case of simple
substitution cipher
The Vigenere code
It uses a text string (say, a word) as a key, which
is then used for doing a number of shifts on the
plaintext
.
The code of CAESAR
It is a mono-alphabetic cipher
wherein each letter of the plaintext is
substituted by another letter to form
the ciphertex
7Solutions www.domain.com
Exemple:Caesar1
DLWFE TNT DYLVP UP GZFD OTD WP XZE AZFC
ALDDPC WP RCZD NSTPY OF QLXPFI NPDLC
DTTZTSLNYPLA
offset is 15
SALUT ICI SNAKE JE VOUS DIS LE MOT POUR
PASSER LE GROS CHIEN DU FAMEUX CESAR
SIIOIHACNEAP
8Solutions www.domain.com
Exemple: Vigenere2
The sender and the receiver decide on a key. Say ‘point’ is the key. Numeric representation of this key is ‘16
15 9 14 20’.
The sender wants to encrypt the message, say ‘attack from south east’. He will arrange plaintext and numeric
key as follows:
a t t a c k f r o m s o u t h e a s t
16 15 9 14 20 16 15 9 14 20 16 15 9 14 20 16 15 9 14
The Cipher text will be as follows
Q I C O W A U A C G I D D H B U P B H
9Solutions www.domain.com
Exemple: Playfair Cipher3
T U O R I
A L S B C
D E F G H
K M N P Q
V W X Y Z
HI DE MO NE YZ
T U O R I
A L S B C
D E F G H
K M N P Q
V W X Y Z
T U O R I
A L S B C
D E F G H
K M N P Q
V W X Y Z
T U O R I
A L S B C
D E F G H
K M N P Q
V W X Y Z
The sender and the receiver deicide on a particular key, say ‘tuorials’
Let us say we want to encrypt the message “hide money”. It will be written as:
Using these rules, the result of the encryption of ‘hide money’ with the key of ‘tuorials’
would be:
QC EF NU MF ZV
10Solutions www.domain.com
Exemple: Transposition Cipher3
The plaintext is “golden statue is in eleventh cave” and the secret random key chosen is “five”. We arrange this
text horizontally in table with number of column equal to key value. The resulting text is shown below.
G O L D E
N S T A T
U E I S I
N E L E V
E N T H C
A V E
The ciphertext is obtained by reading column vertically downward from first to last column. The ciphertext is
‘gnuneaoseenvltiltedasehetivc’.
11Solutions www.domain.com
Modern cryptography:Case od study RSA
12Solutions www.domain.com
• Basicly used in e-commerce but it is
also used in bleu cardes and some
softwares like opnessh(secure
communication using ssh protocol)
• Was first created by Ron Rivest,
Adi Shamir et LenAdleman, en 1977 )
Cb_salah_salah@esi.dz
Asymmetric cryptography : RSA
13Solutions www.domain.comCb_salah_salah@esi.dz
RSA: How Does it Work?
World of cryptography
 A single key used for
encryption and
decryption
 Called private key
 Ex: Ceasar
 Two keys are used
 One for encryption, known by
every one, called public key.
 The other one for decryption,
known only by the receiver,
called private key .
 Ex :RSA
Symmetric
cryptography
Asymmetric
cryptography
14Solutions www.domain.comCb_salah_salah@esi.dz
RSA: How Does it Work?
15Solutions www.domain.comCb_salah_salah@esi.dz
RSA: How to create public and private key?
Public Key: (N,C)
• P ,Q: two prime number
• N=P×Q
• M=(P−1)×(Q−1
• C :coprime number with M
Private Key: (N,U)
• Need to calcualte U
• Theory of Etienne Bézout: to prove
that two numbers a and b are
coprime if only existed two
number u and v that for
a×u+b×v=1 ( u and v are integers)
• It existed u v for that for
C×u+M×v=1
16Solutions www.domain.comCb_salah_salah@esi.dz
RSA: How to find U?
17Solutions www.domain.comCb_salah_salah@esi.dz
RSA: Secure keys
N is the product
of P & Q and it is
public
We construct our
keys only by P Q
Decomposition of
any number into
prime factors is
unique
So it is not thar
secure!!!
18Solutions www.domain.comCb_salah_salah@esi.dz
RSA: Real keys exemple
N = 31074182404900437213507500358885679300373460228427275457201619488232064405
18081504556346829671723286782437916272838033415471073108501919548529007337
724822783525742386454014691736602477652346609
P = 16347336458092538484431338838650908598417836700330
92312181110852389333100104508151212118167511579
Q = 1900871281664822113126851573935413975471896789968
515493666638539088027103802104498957191261465571
80 processors Opteron 2.2GHz for 5 months to find P and Q
19Solutions www.domain.comCb_salah_salah@esi.dz
RSA: Encryption process?
Alice wants to send to Bob : « Bonjour ! »
Step2
B⇔66⇒66^7
o⇔111⇒111^7
n⇔110⇒110^7
j⇔106⇒106^7
o⇔111⇒111^7
u⇔117⇒117^7
r⇔114⇒114^7
(espace)⇔32⇒32^7
!⇔33⇒33^7
Step1
B⇔66
o⇔111
n⇔110
j⇔106
o⇔111
u⇔117
r⇔114
(espace)⇔32
!⇔33
Step3
(66^7)mod(5141)=386
(111^7)mod(5141)=1858
(110^7)mod(5141)=2127
(106^7)mod(5141)=2809
(111^7)mod(5141)=1858
(117^7)mod(5141)=1774
(114^7)mod(5141)=737
(32^7)mod(5141)=3675
(33^7)mod(5141)=244
"Bonjour !" becomes "386 1858 2127 2809 1858 1774 737 3675 244"
20Solutions www.domain.comCb_salah_salah@esi.dz
RSA: Decryption process?
Bob receives from Alice this message : « 386 737 970 204 1858 »
Step2
(386^4279)mod(5141)=66
(737^4279)mod(5141)=114
(970^4279)mod(5141)=97
(204^4279)mod(5141)=118
(1858^4279)mod(5141)=111
Step1
386⇒386^4279
737⇒737^4279
970⇒970^4279
204⇒204^4279
1858⇒1858^4279
Step3
66⇔B
114⇔r
97⇔a
118⇔v
111⇔o
21Solutions www.domain.com
THANK YOU FOR YOUR
ATTENTION!

Contenu connexe

En vedette

PyConFR - testons en python
PyConFR - testons en pythonPyConFR - testons en python
PyConFR - testons en python
gburet
 
Grile évaluation rappel de cours
Grile évaluation rappel de coursGrile évaluation rappel de cours
Grile évaluation rappel de cours
Antoine Taly
 
Algorithmique_et_programmation_part2
Algorithmique_et_programmation_part2Algorithmique_et_programmation_part2
Algorithmique_et_programmation_part2
Emeric Tapachès
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 
Chap XIII : calcul scientifique avec python
Chap XIII : calcul scientifique avec pythonChap XIII : calcul scientifique avec python
Chap XIII : calcul scientifique avec python
Mohammed TAMALI
 

En vedette (20)

Code Week 2014 - atelier d'initiation à la programmation avec python
Code Week 2014 - atelier d'initiation à la programmation avec pythonCode Week 2014 - atelier d'initiation à la programmation avec python
Code Week 2014 - atelier d'initiation à la programmation avec python
 
Programmation objet
Programmation objetProgrammation objet
Programmation objet
 
Biopython
BiopythonBiopython
Biopython
 
PyConFR - testons en python
PyConFR - testons en pythonPyConFR - testons en python
PyConFR - testons en python
 
Présentation de l'appication Nao Beer Buddy
Présentation de l'appication Nao Beer BuddyPrésentation de l'appication Nao Beer Buddy
Présentation de l'appication Nao Beer Buddy
 
Grile évaluation rappel de cours
Grile évaluation rappel de coursGrile évaluation rappel de cours
Grile évaluation rappel de cours
 
PhD Proposal
PhD ProposalPhD Proposal
PhD Proposal
 
Algorithmique_et_programmation_part2
Algorithmique_et_programmation_part2Algorithmique_et_programmation_part2
Algorithmique_et_programmation_part2
 
Python et les bases de données non sql
Python et les bases de données non sqlPython et les bases de données non sql
Python et les bases de données non sql
 
Base NoSql et Python
Base NoSql et PythonBase NoSql et Python
Base NoSql et Python
 
Python in Computer Vision
Python in Computer VisionPython in Computer Vision
Python in Computer Vision
 
Cours fabrication mécanique5
Cours fabrication mécanique5Cours fabrication mécanique5
Cours fabrication mécanique5
 
cryptography
cryptographycryptography
cryptography
 
Cours fabrication mécanique1
Cours fabrication mécanique1Cours fabrication mécanique1
Cours fabrication mécanique1
 
Python et son intégration avec Odoo
Python et son intégration avec OdooPython et son intégration avec Odoo
Python et son intégration avec Odoo
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Chap XIII : calcul scientifique avec python
Chap XIII : calcul scientifique avec pythonChap XIII : calcul scientifique avec python
Chap XIII : calcul scientifique avec python
 
Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2
 
Notion de fonction en Python
Notion de fonction en PythonNotion de fonction en Python
Notion de fonction en Python
 

Similaire à Cryptography basics

Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
phanleson
 
Cryptography
CryptographyCryptography
Cryptography
Rohan04
 
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Mona Rajput
 
Cryptography for developers
Cryptography for developersCryptography for developers
Cryptography for developers
Kai Koenig
 

Similaire à Cryptography basics (20)

Cryptography (Revised Edition)
Cryptography (Revised Edition)Cryptography (Revised Edition)
Cryptography (Revised Edition)
 
Cryptography
CryptographyCryptography
Cryptography
 
Traditional symmetric-key cipher
Traditional symmetric-key cipherTraditional symmetric-key cipher
Traditional symmetric-key cipher
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
 
CryptX '22 W1 Release (1).pptx
CryptX '22 W1 Release (1).pptxCryptX '22 W1 Release (1).pptx
CryptX '22 W1 Release (1).pptx
 
Crypt
CryptCrypt
Crypt
 
Cryptography
Cryptography Cryptography
Cryptography
 
Cryptography - Overview
Cryptography - OverviewCryptography - Overview
Cryptography - Overview
 
Cryptography and .NET
Cryptography and .NETCryptography and .NET
Cryptography and .NET
 
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
 
ET4045-2-cryptography-2
ET4045-2-cryptography-2ET4045-2-cryptography-2
ET4045-2-cryptography-2
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography for developers
Cryptography for developersCryptography for developers
Cryptography for developers
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
Cryptography
CryptographyCryptography
Cryptography
 

Plus de Shellmates

Atelier Python 2eme partie par Achraf Kacimi El Hassani
Atelier Python 2eme partie par Achraf Kacimi El HassaniAtelier Python 2eme partie par Achraf Kacimi El Hassani
Atelier Python 2eme partie par Achraf Kacimi El Hassani
Shellmates
 
BSides Algiers - Stuxnet - Sofiane Talmat
BSides Algiers - Stuxnet - Sofiane TalmatBSides Algiers - Stuxnet - Sofiane Talmat
BSides Algiers - Stuxnet - Sofiane Talmat
Shellmates
 
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal HarouniBSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
Shellmates
 
BSides Algiers - Layer7 DoS Attacks - Oussama Elhamer
BSides Algiers - Layer7 DoS Attacks - Oussama ElhamerBSides Algiers - Layer7 DoS Attacks - Oussama Elhamer
BSides Algiers - Layer7 DoS Attacks - Oussama Elhamer
Shellmates
 
BSides Algiers - Reversing Win32 applications - Yacine Hebbal
BSides Algiers - Reversing Win32 applications - Yacine HebbalBSides Algiers - Reversing Win32 applications - Yacine Hebbal
BSides Algiers - Reversing Win32 applications - Yacine Hebbal
Shellmates
 
BSides Algiers - Normes ISO 2700x - Badis Remli
BSides Algiers - Normes ISO 2700x - Badis RemliBSides Algiers - Normes ISO 2700x - Badis Remli
BSides Algiers - Normes ISO 2700x - Badis Remli
Shellmates
 
BSides Algiers - Metasploit framework - Oussama Elhamer
BSides Algiers - Metasploit framework - Oussama ElhamerBSides Algiers - Metasploit framework - Oussama Elhamer
BSides Algiers - Metasploit framework - Oussama Elhamer
Shellmates
 
BSides Algiers - PHP Static Code Analysis - Abdeldjalil Belakhdar
BSides Algiers - PHP Static Code Analysis - Abdeldjalil BelakhdarBSides Algiers - PHP Static Code Analysis - Abdeldjalil Belakhdar
BSides Algiers - PHP Static Code Analysis - Abdeldjalil Belakhdar
Shellmates
 
BSides Algiers - Certification Electronique - Lilia Ounini
BSides Algiers - Certification Electronique - Lilia OuniniBSides Algiers - Certification Electronique - Lilia Ounini
BSides Algiers - Certification Electronique - Lilia Ounini
Shellmates
 

Plus de Shellmates (13)

HTML basics
HTML basics HTML basics
HTML basics
 
Malware Analysis par Mohamed Ali FATHI - BSides Algiers 2k15
Malware Analysis par Mohamed Ali FATHI - BSides Algiers 2k15Malware Analysis par Mohamed Ali FATHI - BSides Algiers 2k15
Malware Analysis par Mohamed Ali FATHI - BSides Algiers 2k15
 
Atelier Python 2eme partie par Achraf Kacimi El Hassani
Atelier Python 2eme partie par Achraf Kacimi El HassaniAtelier Python 2eme partie par Achraf Kacimi El Hassani
Atelier Python 2eme partie par Achraf Kacimi El Hassani
 
JavaScript 1.0 by Zakaria Smahi
JavaScript 1.0 by Zakaria SmahiJavaScript 1.0 by Zakaria Smahi
JavaScript 1.0 by Zakaria Smahi
 
Introduction à Python - Achraf Kacimi El Hassani
Introduction à Python - Achraf Kacimi El HassaniIntroduction à Python - Achraf Kacimi El Hassani
Introduction à Python - Achraf Kacimi El Hassani
 
BSides Algiers - Stuxnet - Sofiane Talmat
BSides Algiers - Stuxnet - Sofiane TalmatBSides Algiers - Stuxnet - Sofiane Talmat
BSides Algiers - Stuxnet - Sofiane Talmat
 
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal HarouniBSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
 
BSides Algiers - Layer7 DoS Attacks - Oussama Elhamer
BSides Algiers - Layer7 DoS Attacks - Oussama ElhamerBSides Algiers - Layer7 DoS Attacks - Oussama Elhamer
BSides Algiers - Layer7 DoS Attacks - Oussama Elhamer
 
BSides Algiers - Reversing Win32 applications - Yacine Hebbal
BSides Algiers - Reversing Win32 applications - Yacine HebbalBSides Algiers - Reversing Win32 applications - Yacine Hebbal
BSides Algiers - Reversing Win32 applications - Yacine Hebbal
 
BSides Algiers - Normes ISO 2700x - Badis Remli
BSides Algiers - Normes ISO 2700x - Badis RemliBSides Algiers - Normes ISO 2700x - Badis Remli
BSides Algiers - Normes ISO 2700x - Badis Remli
 
BSides Algiers - Metasploit framework - Oussama Elhamer
BSides Algiers - Metasploit framework - Oussama ElhamerBSides Algiers - Metasploit framework - Oussama Elhamer
BSides Algiers - Metasploit framework - Oussama Elhamer
 
BSides Algiers - PHP Static Code Analysis - Abdeldjalil Belakhdar
BSides Algiers - PHP Static Code Analysis - Abdeldjalil BelakhdarBSides Algiers - PHP Static Code Analysis - Abdeldjalil Belakhdar
BSides Algiers - PHP Static Code Analysis - Abdeldjalil Belakhdar
 
BSides Algiers - Certification Electronique - Lilia Ounini
BSides Algiers - Certification Electronique - Lilia OuniniBSides Algiers - Certification Electronique - Lilia Ounini
BSides Algiers - Certification Electronique - Lilia Ounini
 

Dernier

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 

Dernier (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 

Cryptography basics