Proposal for Translating Cryptology Terms to Hebrew Yossi Markovitz initiated this list. Ron Irmai, Shraga Irmai, Adi Shamir, Moti Yung, Orr Dunkelman and Roni Roth contributed various terms and had var- ious suggestions that improved this list. Some translations were adopted from the Israeli electronic signature law, 2001. � Eli Biham - May 3, 2005 c 617 Proposal for Translating Cryptology Terms to Hebrew (21)
✄ ✑ ✁ ☛ ✍ ☎ ✚ ✙ ✂ ✏ ✝ ✒ ✆ ✌ ☛ ✍ ☛ ✄✑ ✁ ☛☞ ✢ ✟ ✢ ✁ ✏ ✄✑ ✁ ✝ ✝ ✄ ✏✚ ☛ ✁ ✗ ✄ ✝ ✑ ☎ ✌ ✄✂ ✢ ☛ ✄ ✙ ☛✝ � ☛ ✝ ☛ ✢ ✄ ✙ ☛ ✄ ✒ ✢ ✁ ✢ ✥ ☛ ✖ ✍ ✙ ✢ ☛ ✄ ✙ ✄ ✙ ✢ ☞ ✂ ☞ ☛ ✂ ✙ ✚ ☎ ✞ ✠ ✄✂ � ✁✂ ✆✝ ✒ ✝ ✞ ☎ ✄✑ ✟ ✢ ✔ ✂ ✏ ✄✑ ✁ ☎ ✏ ☎ ✙ � ✁✂ ✄☎ ✆✝ ✞ ✄✂ ☎ ☎ ✝ ☛☞ ☛✌ ✂ ☛✍ ✎ ✠ ☛ ☛ ✝ ✖ ✒ ✗ ✄✑ ☛ � ✜ ✂ ✖ ✆ ✄ ✎ ✠ ✞ ☞ ✂ ✒ ✏ ✎ ✙ ☛ ☎ ✌ ✁✕ ✂ ✒ ✏✖ ✞ ✄✂ ✟ ✘ ✙ � ✗ ✏ ✆ ✒ ✟ ✎ General Terms Cryptography ✟✡✠ Cryptology ✎✓✠ Cryptanalysis Cryptographer ✒✛✚ Cryptanalyst Encryption Decryption Cipher Cryptosystem Plaintext Ciphertext Key Password One-Time Pad ✄✤✣ Key Distribution, Key Exchange Key space � Eli Biham - May 3, 2005 c 618 Proposal for Translating Cryptology Terms to Hebrew (21)
✄ ✌ ✁ ☛ ✟ ✄ ☛ ✙ ✄ ☛ ✢ ✏ ✢ ✁✑ ☎ ✆ ✁ ☛ ✟ ✄ ✁ ✙ ☛☞ ✆ ✒ ✂ ✙ ☛ ✒ ✙ ✑ ✚ ✁ ✁ ☛ ✟ ✄ ☛ ✙ ✂ ✝ ✙ ✗ ✘ ✁ ☛ ✟ ✄ ☛ ✢ ✄ ✝ ✘ ☛ ✁ ✌ ☛ ✥ ✝ ✚ ✟ ✁ ☛ ✟ ✄ ☛ ✍ ✌ ✂ ☛☞ ☎ ☛ ✌ ✥ ✁ ✁ ☛ ✟ ✄ ✁ ✂ ✝ ☛ ✌ ✟ ✄ ☛ ✍ ☛ ✌ ✆ ✒ ✝ ✂ ✏ ✢ ✒ ☎ ✄ ✁ ☛ ✟ ✄ ☛ ✍ ☛ ✌ ✆ ✖ Types of Attacks Attack Ciphertext Only Attack ✒✛✌ Known Plaintext Attack Chosen Plaintext Attack Adaptive Attack Chosen Key Attack Exhaustive Search Attack Dictionary Attack Meet in the Middle Attack � Eli Biham - May 3, 2005 c 619 Proposal for Translating Cryptology Terms to Hebrew (21)
✝ ✝ ✖ ✏ ✒ ✂ ✁✕ ✥ ✄✂ ☎ ✏ ✑ ✂ ✌ ✂ ☛ ✙ ✄✂ ✝ ✥ ☛ ✄ ✚ ✘ ✒ ✠ ✎ ✖ ✝ ✄ ✗ ☛ ✞ ☎ ✚ ✟ ✥ ✄✂ ☎ ✏ ✑ ✂ ✖ ✏ ☛ ✍ ✝ ✏ ✁ ✂ ☎ ✟ ✂ ✒ ☛ ✂ ☎ ✖ ✏ ✒ ✄✂ ✁✕ ✂ ✒ ✏ ✖ ✞ ✄ ✝ ✂ ✑ ✌ ✝ ✥ ✙ ✄ ☛ ✢ ✝ ☛ ✁ ✘ ✒ ✌ ☎ ✝ ✕ ✄ ✔ ✂ ✟ ✝ ✖ ✗ ✝ ✄ ✑ ✆✝ � ✞ ✘ ✗ ✚ ✢ ✒ ✑ � ✙ ☛ ✒ ☛ ✣ ✑ ✝ ✄ ✗ ✔ ✥ ✝ ✣ ✝ ☛ ✒ ✄ ✙ ☛ ☛ ✁✕ ✘ ✢ ✄ ✢ ☛ ✄ ✙ ✚ ✗ ☎ Symmetric Ciphers Terms Block Cipher ✒✛✌ Stream Cipher Round Key Schedule Subkey Weak Key Double Encryption Triple Encryption Mode of Operation Differential Cryptanalysis ✒✛✖ Linear Cryptanalysis Characteristic Differential ✒✛✖ Linear Feedback Shift Register � Eli Biham - May 3, 2005 c 620 Proposal for Translating Cryptology Terms to Hebrew (21)
☛ ✔ ✄ ✟ ☛ ✥ ✒ ✁ ✝ ✥ ✂ ☛ ✄ ✟ ☛ ✁ ☎ ✝ ☛ ✥ ✖ ✥ ✝ ✟ ✝ ✏ ✒ ✟ ✁ ✁ ✔ ✝ ✂ ☞ ✑ ✝ ✝ ✟ ✑ ✙ ☛ ☛ ✂ ✑ ✏ ✒ ✝ ✄ ☛ ✁ ☞ ✂ ☛✝ ✒ ✘ ✝ ✆ ✏ ☛ ✁ ✂ ☛ ✂ ✖ ✝ ✘ ✆ ✏ ☛ ✁ ✙ ☛ ✥ ✏ ✏ ✝ ✄ ✄✂ ☛ ✂ ✝ ✑ ✝ ✍ ✣ ✥ ✢ ✁✂ ✟ ✂ ✟ ☎ � ☎ ✁✕ ✒ ✝ ✌ ✚ ☛ ✎ ☛ ✝ ✑ ✙ ☛ ✑ ✏✝ ✁ ✙ ✏✝ ✄ ✥ ☛ ✂ ✑ ☛ ✑ ✄ ☛ ✝ ✚ ✥ ✝ ✟ ✂ ✄ ✍ ✝ ☛ ✂ ✏ ✝ ✝ ✣ ☛ ✥ ✢ ☛ ✝ ✑ ✙ ☛ ✢ Hashing Terms Hash Function scrambling One Way Function One Way Hash Function Hash Value Message Authentication Code Birthday Paradox Birthday Attack Collision Collision Free Hash Function Compression Function Padding � Eli Biham - May 3, 2005 c 621 Proposal for Translating Cryptology Terms to Hebrew (21)
☛ ✠ ☛ ✂ ☛ ✘ ☛ ✝ ☎ ✝ ✘✂ ✖ ☛ ✄ ✂ ✏✝ ☎ ✞ ✟ ✒ ✖ ✁ ✥ ✝ ✚ ✙ ☛ ✝ ✝ ☎ ✞ ✟ ✁✂ ✁ ✙ ✂ ✢ ✢ ✥ ☛ ✙ ✢ ✖ ✣ ✂ ✝ ✁✕ ✍ ✂ ✌ ✙ ✝ ✄ ☛ ☛ ✏ ✁ ✙ ✂ ✘ ☎ ✂ ☛ ✂ ✚ ✝ ✌ ☎ ✄ ✌ ✏ ☛ ☛ ✥ ✝ ✍ ✒ ✙ ☛ ✒ ✥ ☛ ✞ ☎ ✔ ✘ ✖ ✙ ☛ ✝ ✘☎ ✠ ☎ ✘ ✖ ✙ ☎ ✝ ✝ ✆ ✏ ✔ ✂ ☎ ✝ ✘ ✖ ✂ ✒ ✝ ✂ ✚ ✌ ✙ � ✔ ✂ ✝ ☞ ✙ ✔ ✂ ✏✝ ✝ ☛ ✒ ✘✂ ✁ ✖ ✂ ✌ ✙ ✝ ✄ ✌ ✔ ✄ ✢ ☎ ✄✑ ✂ ✌ ✙ ✝ ✄ ✢ ☛ ✄ ✙ ☛✝ ✏ ✄ ✄ � ✂ ☎ ✝ ✌ ✑ ✎ ✂ ✌ ✙ ✝ ☞ ✝ ☛ ✑ ☎ ✄ ✎ ✂ ✥ ✝ ☞ ✢ ☛ ✄ ✙ ☛ ✂ ✂ ☛ ☎ ✄ ☞ ✁ ✙ ✂ ☛ ✢ ✠ ✞ � ✄ ✏ ✙ ✖ ✝ ✁ � ✂ ☎ ✝ ✌ ✑ ✝ ✂ ✟ ✖ ✢ ☛ ✄ ✙ ✁ ✁ ✘ ✚ ✙ ✒ ✔ Public Key Terms Public Key Cryptography Public Key ✒✛✚ Secret (Private) Key Digital Signature ✒✛✖ Authentication Identification Public Key Infrastructure Certificate Certification Authority Certificate Revocation List Quadratic Sieve Trapdoor One-Way Function � Eli Biham - May 3, 2005 c 622 Proposal for Translating Cryptology Terms to Hebrew (21)
☞ ☞ ✞ ☎ ✟ ✁ ✂ ✥ ✔ ☛ ✂ ☎ ✆✝ ✒ ✢ ✝ ✂ ✒ ✝ ✥ ✝ ✙ ✘ ✂ ☎ ✒ ✝ ✥ ✝ ✙ ✗ ✂ ✆ ✌ ☎ ✔ ✂ ☎ ✄ ☞ ✙ ✁ ☛ ☎ ✝ ☛ ✙ ✟ ✝ ✂ ✝ ✄ ✚ ✔ ☎ ✝ ✆ ☎ ✂ ✏✝ ✘ ✖ ☎ ✔ ☎ ✝ Number Theory Terms Number Theory Factoring Factor Prime Factor Discrete Logarithm Modulus Modular Arithmetic Exponent � Eli Biham - May 3, 2005 c 623 Proposal for Translating Cryptology Terms to Hebrew (21)
✝ ✖ ✍ ✝ ✁ ✍ ☛ ✂ ✌ ✂ ✞ ✟ ☎ ✁ ✞ ✏ ✂ ✖ ✚ ✥ ✂ ☞ ✄ ✖ ✢ ✖ ✢ ✁ ✚ ✥ ✂ ☞ ✄ ✖ ☛ ✢ ✍ ✝ ✁ ✂ ☛ ✂ ✌ ✂ ✞ ✟ ✖ ☎ ✞ ✏ ☛ Zero Knowledge Terms Zero Knowledge Proof Interactive Proof Zero Knowledge Interactive Proof � Eli Biham - May 3, 2005 c 624 Proposal for Translating Cryptology Terms to Hebrew (21)
✁ ✂ ✢ ✒ ✞ ✁ � ✝ ✂ ✍ ✝ ✒ ✒ ✁ ☛✝ ☎ ✆ ✔ ✙ ✏ ✁✂ ✎ ✖ ✙ ☛ ✢ ✒ ✟ ✁ ✂ ✌ ✘ ✂ ✙ ☞ ✄ ☎ ✙ ✆✝ ✥ ☎ ✙ ☎ ✖ ✘ ✌ ✒ ✙ ✏ ✂ ✝ ☛ � ✂ ✍ ✖ ✒ ✁ ✚ ☛ ✘ ✌ � � ☎ ☞ ✍ ✙ ☛ ☞ � ✟☎ ✘ ☛ ✝ ☞ ✒ ✝ ✥ ✝ ✢ ✒ ✝ ✟ ☛ ☞ ✝ ✥ � ✟ ✢ ✂ ☎ ☛ ✝ � ✌ ✂ ✗ ✁ ☎ ✌ ✁ ✆ ✝ ✙ ✝ ✂ ✔ � ✘ ☛✝ � ✎ ✘ ☛ � ✁ ✌ � ✝ Secret Sharing Terms Secret Sharing ✎✓✠ Threshold Scheme Share SHETEF ✎✓✠ Share Holder Share ✒✛✝ ✒✛✚ � Eli Biham - May 3, 2005 c 625 Proposal for Translating Cryptology Terms to Hebrew (21)
✖ ✂ ✖ ✂ ☛ ✣ ✒ ✍ ✖ ✝ ✁☎ ✙ ✟ ☞ ✄ ☎ ✙ ✟ ☎ ✖ ✂ ✣ ☎ ✖ ✍ ✂ ✄ ✁✂ ✞ ☛ ✝ ☎ ☛ ✁ ✙ ✥ ✁☎ ✚ ✏✖ ✕ ☎ ✚ ✝ ✗ ✗ ☞ ✥ ✒ ✖ ☎ ☞ ✂ ✂ ✔ ☎ ✚ ☎ ✝ � ✢ ✝ ✂ ✂ ✙ ✍ ☞ � ☞ ✄ ☎ ☛ ✂ ✥ ☛ ✝ ✖ ✁☎ ✖ ✙ ☞ ✄ ☎ ✖ ✟ ☎ ✂ ✑ ✕ ✁ ☛ ✢ ✕ ☛✝ ✍ ✒ ✢ ✂ ✝ Other Terms Digital Cash, Electronic Money Covert Channel, Subliminal Channel Handshake Impersonation Random Number Pseudo-Random Number Pseudo-Random Sequence Seed Information Theory Entropy Trusted Center � Eli Biham - May 3, 2005 c 626 Proposal for Translating Cryptology Terms to Hebrew (21)
Recommend
More recommend