• Tidak ada hasil yang ditemukan

History of Networking and Security

N/A
N/A
Protected

Academic year: 2018

Membagikan "History of Networking and Security"

Copied!
69
0
0

Teks penuh

(1)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Networking and Security

Networking and Security

Darwin Gosal

(2)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Outline

Outline

History of communication

History of telecommunication

Computer networking now and beyond Information Security

Ancient cryptography

Overview of modern cryptography

(3)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

History of Communication

History of Communication

(4)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

History of Communication

History of Communication

Speech

200,000 years ago (FOXP2 gene) Unreliable storage: human memory

20Hz 300Hz

500Hz 3kHz

4kHz 14kHz 20kHz

speech

human voice

(5)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

History of Communication

History of Communication

Symbol

Rock carving Cave painting Pictograms

(6)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Symbol

Symbol

Cave Paintings

Rock Carving (Petroglyph)

(7)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Symbol

Symbol

Pictograms (9000 BC) Ideograms

Logographic (4000BC)

Water, Rabbit, & Deer from Aztec Stone of the Sun

Ideograms from Mi’kmag hieroglyps

2600 BC Sumerian Cuneiform

Egyptian hieroglyph

(8)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Symbol

Symbol

Alphabet / Adjad

A mapping of single symbols to single phonemes

Nearly all alphabetical scripts used around the world derived from Proto-Sinaitic alphabet

“Ba’alat” means

Lady (title for Hathor, feminime title for

(9)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

History of Communication

History of Communication

Writing tools / medium

Papyrus (3000BC)

The first newspaper, Acta Diurna (59BC) Paper (100AD)

Pens (1000AD)

Printing press, Gutenberg (1400AD) Typewriter (1800s)

(10)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

History of Telecommunication

History of Telecommunication

Transportation

Foot soldier Postal system Sneaker-net

F-16 payload: 4600kg

76,470pcs of 2.5” 160GB HDD Capacity: 12 Peta-Bytes

Speed: Mach 2 Range: 3200km

(11)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

History of Telecommunication

History of Telecommunication

Drums signal

(12)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

History of Telecommunication

History of Telecommunication

Heliograph (Greek, 405BC) Modern Heliograph

using Morse code (1810) Semaphore (1972)

(13)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

History of Telecommunication

History of Telecommunication

Electric Telegraph

1st commercial version (1937) by Wheatstone & Cooke

9 April 1839 – 21km First transatlantic

telegraph cable (1866)

(14)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

History of Telecommunication

History of Telecommunication

Telephone (1876)

Alexander Graham Bell Elisha Grey

Antonio Meucci

Bell Telephone Company (1877)

(15)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

History of Telecommunication

History of Telecommunication

Radio / Wireless Telegraph (1890s)

Nikola Tesla (1893)

Guglielmo Marconi (1901)

1st wireless comm. between UK & US

Won Nobel Prize in Physics (1909)

(16)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

From Analog to Digital

From Analog to Digital

Claude Shannon

Father of Modern Information Theory

Publish: A Mathematical Theory of Communication (1948)

Won 1936 Nobel on: “A Symbolic

(17)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Computer Networking

Computer Networking

1960/4 - Research on Packet Switching 1968 - DARPA contracts with BBN to create ARPAnet

1970 - The first 5 nodes: BBN, Stanford, UCLA, UC Santa Barbara, & U of Utah. 1972 - TCP created by Vint Cerf

(18)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Computer Networking

Computer Networking

1983 – TCP/IP compliant network ARPAnet + X.25 + UUCP + NSFnet

1989 – Tim Berners-Lee, CERN, invented HTML thus World-Wide-Web.

1993 – Mosaic, the 1st graphical browser

Internet

Internet

5000

562

213

100 1000 10000 100000

1981 1982 1983 1984 1985 1986 1987 1988 1989

Years

H

o

s

(19)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Computer Networking

Computer Networking

1992 – Internet Society (ISOC) given

formal oversight of the Internet Activities Board (IAB) and the Internet Engineering Task Force (IETF)

(20)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Networking now and beyond

Networking now and beyond

Personal Area Network

Bluetooth, PDA-phone, Notebook Local Area Network

Gigabit, WiFi (802.11a/b/g/n) Wide Area Network

Frame-Relay, ATM, GSM (EDGE, GPRS), CDMA (3G)

MAN

(21)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Networking now and beyond

Networking now and beyond

IPv6 (232 2128), Internet 2 Peer to Peer (Usenet 1979)

Wireless Mesh network (802.11s)

Convergence VoIP

Starhub cable: TV, Phone, Broadband RFID (spychips?)

GPS

(22)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Networking now and beyond

Networking now and beyond

(23)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Information Security

Information Security

Confidentiality (Authentication)

Ensuring the information is accessible only to

authorized personal (prevent unauthorized disclosure)

Integrity (Non-repudiation)

Safeguarding the accuracy and completeness of the information (prevent unauthorized modification)

Availability (Reliability)

(24)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Information Security

Information Security

Confidentiality

PIN,Password, Passphrase, Biometrics, Tokens, Encryption

Integrity

MD5, SHA1

Availability

(25)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Information Security

Information Security

Network Security Firewall, IDS, VPN Application Security

SELinux, Secure coding Host (End-point) Security

(26)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Information Security

Information Security

Hacker activity

Worms & viruses

SPAM

Spyware

Phishing

Firewall

Intrusion Detection

SPAM filtering

Anti-Spyware

(27)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Information Security

Information Security

Trusted Computing (TPM) Palladium

Digital Right Management (DRM)

Play4Sure, DVD’s Content Scrambling System (CSS)

(28)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Security Model

Security Model

Threat avoidance (Military model)

(29)

Quantum Information Technology Group – Quantumlah

R

is

k

M

a

n

a

g

e

m

e

n

t

R

is

k

M

a

n

a

g

e

m

e

n

(30)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Security Model

Security Model

Risk Management (Business model)

Security is relative (many risks and solutions)

Accept the risk

(31)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Cryptography

Cryptography

Claude Shannon

Father of modern cryptography

Communication Theory of Secrecy Systems” Cryptology (scrambling)

Cryptography Cryptanalysis

(32)

Quantum Information Technology Group – Quantumlah

C

ry

p

to

g

ra

p

h

y

C

ry

p

to

g

ra

p

h

(33)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

History of Cryptography

History of Cryptography

Atbash cipher

Hebrew (600BC)

Permutation cipher (Greek) Scytale (6BC)

Subtitution cipher Caesar Shift

(34)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

History of Cryptography

History of Cryptography

Queen Mary’s Cipher (Babington Plot)

Plot to free Queen Mary, incite a rebellion, and

murder Queen Elizabeth. The conspirators

communicated with

Queen Mary, who was being held prisoner by

(35)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

History of Cryptography

History of Cryptography

Nomenclator – 23 symbols representing

letters, and 35 symbols representing words

Cracked by Thomas Phelippes

at the first Cipher school in England

(36)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

History of Cryptography

History of Cryptography

Mary replied to a letter from Babington using the compromised cipher.

Phelippes added a forged postscript from Queen Mary asking Babington for the

(37)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

History of Cryptography

History of Cryptography

Mary was beheaded

(38)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

History of Cryptography

History of Cryptography

Al-Kindi (800AD)

Frequency Analysis Lipograms

English: ETAOINSHR German: ENIRSATUD French: EAISTNRUL Spanish: EAOSNRILD Italian: EAIONLRTS Finnish: AITNESLOK

(39)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Lipograms

Lipograms

The most famous lipogram: Georges Perec, La Disparition (1969) 85000

words without the letter e:

Gottlob Burmann (1737-1805) R-LESS POETRY. An obsessive dislike for the

(40)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

History of Cryptography

History of Cryptography

Enigma (WW2) Vernam Cipher

3DES AES

Gilbert Vernam (AT&T) 1918

Claude Shannon of Bell Labs (ca. 1945) proved the one time pad guaranties perfect security as long as:

(41)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

DES Cracker

DES Cracker

(42)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Key Distribution

Key Distribution

Public Key Cryptosystem RSA (Factoring)

Others:

(43)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Modern Cryptography

Modern Cryptography

Public-Key Cryptosystem (RSA, ECC) Public Key Infrastructure

Authentication method

Diffie-Hellman key exchange

Session key created for symmetric cryptography

(44)

Quantum Information Technology Group – Quantumlah

D

iff

ie

-H

e

llm

a

n

D

iff

ie

-H

e

llm

a

(45)

Quantum Information Technology Group – Quantumlah

D

iff

ie

-H

e

llm

a

n

D

iff

ie

-H

e

llm

a

(46)

Quantum Information Technology Group – Quantumlah

D

iff

ie

-H

e

llm

a

n

D

iff

ie

-H

e

llm

a

(47)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Copyright, 2000-2006 by NetIP, Inc. and Keith Palmgren, CISSP

Diffie-Hellman

(48)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Computational Complexity

Computational Complexity

n

L

L

2

INPUT SIZE

E

x

e

c

u

ti

o

n

T

im

e

(49)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Quantum Computer

Quantum Computer

(50)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Quantum Cryptography

Quantum Cryptography

In April 2004, the EU decided to spend €11 million

developing secure communication based on quantum cryptography — the SECOQC project — a system that would theoretically be unbreakable by ECHELON or any other espionage system. European governments have been leery of ECHELON since a December 3, 1995 story in the Baltimore Sun claiming that

aerospace company Airbus lost a $6Billion contract with Saudi Arabia in 1994 after the NSA reported that Airbus officials had been bribing Saudi officials to

secure the contract.

Source: Wikipedia

(51)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Quantum Cryptography

Quantum Cryptography

Quantum Key Distribution Bit = 0’s or 1’s

(52)

Quantum Information Technology Group – Quantumlah

Q

u

b

it

Q

u

b

it

W

h

ic

h

p

a

th

is

ta

k

e

n

?

B

O

T

(53)

Quantum Information Technology Group – Quantumlah

Q

u

b

it

Q

u

b

it

W

h

a

t d

o

y

o

u

s

e

e

(54)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Qubit

Qubit

Ψ = α 0 + β 1

0 1

or

Ψ = + + +

+ + + +

000 001 010 011

100 101 110 111

(55)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

measuring polarisation states of photons

H

V

+45

-45

PBS (H/V) PBS (45/-45)

Heisenberg Uncertainty Principle

(56)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

BB84

BB84

1 0 1 1 1 0 1 1 …

Key generation

+ + X + + + X X …

Base selection

V H -45 V V H -45 -45 …

Base selection

X + X + + X + X …

Encoding

45 H -45 V V -45 H -45 …

0 0 1 1 1 0 0 1 …

Base discussion Over public channel

0 1 1 1 …

(57)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

BB84

BB84

No Cloning Theorem : It is not possible to copy an unknown quantum state with perfect fidelity.

Bound on copying fidelity is such that Eve will not succeed in tapping the channel even if using the best possible quantum copying machine.

(58)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

BB84

BB84

(59)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Entangled State

Entangled State

) (

2 1

) (

i s

i i

s V e V H

H − α

= Ψ −

(60)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Entanglement

Entanglement

“If, without in any way disturbing a system, we can predict with

certainty… the value of a physical quantity,

then there exists an element of physical reality corresponding to this physical

quantity”

PERFECT

(61)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Local Realism

Local Realism

Local realism is refuted by quantum theory

Entangled photons do not have predetermined values of polarization…

…so eavesdropper has nothing to measure

Quantum mechanics allows eavesdropper free communication

Any post-quantum theory that refutes local realism allows eavesdropper free

(62)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Ekert 91

Ekert 91

( H VV H )

=

Ψ −

2 1

) (

Perfect Security for error < 15%

( 45 45 45 45 )

2 1 )

(

+ −

− −

+ =

(63)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

History of Q. Cryptography

History of Q. Cryptography

C.H. Bennett & G. Brassard 1984

Prepare and Measure Protocols

Entanglement Based Protocols

(64)

Quantum Information Technology Group – Quantumlah

E

x

p

e

rim

e

n

ts

E

x

p

e

rim

e

n

ts

A

lp

s

(2

3

.4

k

m

)

V

ie

n

n

(65)

Quantum Information Technology Group – Quantumlah

1

0

J

a

n

2

0

0

4

R

is

e

o

f t

h

e

Q

u

a

n

tu

m

Is

la

n

(66)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Governments

Governments

US (US$ 100M = SG$ 166M)

US Army, NSA, DARPA, NIST, etc

Japan (SG$ 41.5M)

ERATO, ICORP, PRESTO

Europe (€ 15M = SG$ 30M)

Australia (AU$ 10M = SG$ 13M) Singapore (SG$ 8M)

(67)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

Commercial

Commercial

MagiQ (US) BBN (US)

id-Quantique (Swiss) QinetiQ (UK)

D-wave (Canada) Elsag (Italy)

Fujitsu & Toshiba (UK + Japan) Lockheed Martin (US)

(68)

Q

u

a

n

tu

m

I

n

fo

r

m

a

ti

o

n

T

ec

h

n

o

lo

g

y

G

ro

u

p

Q

u

a

n

tu

m

la

h

The Future

The Future

Hybrid System Satellite

(69)

Quantum Information Technology Group – Quantumlah

T

h

in

k

li

k

e

a

p

h

y

s

ic

is

ts

Referensi

Dokumen terkait

Pengumpulan data pada penelitian ini dilakukan dengan metoda survey. Instrumen yang digunakan untuk mengumpulkan data pada penelitian ini adalah kuesioner dengan

masih diberikan arahan, bahwa tidak keluar dari esensi gerak khas yang.. terdapat pada tari Topeng Banjar. Selama proses tersebut masih ada saja yang. melakukan gerakan

untuk mendapatkan keuntungan sehingga dapat digunakan untuk pengumpulan modal. Dalah satu bentuk nyata dari pola produksi kapitalisme adalah komersialisasi. Komersialisasi

Data tentang prestasi kerja karyawan harus cepat dan teratur terkumpul setiap saat (hari, minggu, bulan). Standar yang ditetapkan haruslah mempunyai kadar/ tingkat kesulitan yang

Penawaran yang dikoreksi Aritmatik oleh Panitia adalah Seluruh Penawaran yang Masuk pada saat Pemasukan Penawaran maka Panitia telah mengoreksinya dengan hasil sebagai berikut

Dengan membawa semua dokumen kualifikasi dan penawaran asli atau salinan yang telah disahkan oleh pihak yang berwenang. Demikian undangan ini kami sampaikan atas

Alat tutur atau alat artikulasi merupakan alat-alat yang memainkan peranan amat penting dalam mengeluarkan atau menghasilkan bunyi bahasa.. Alat-alat ini adalah terdiri daripada

• Jika kemudian dilakukan pengamatan terhadap 35 pasien dan 25 diantaranya berhasil menjalani transplantasi ginjal, apakah dapat dikatakan bahwa obat baru tersebut lebih baik