Proposal for Translating Cryptology Terms to Hebrew
Yossi Markovitz initiated this list. Ron Irmai, Shraga Irmai, Adi Shamir, Moti Yung, Orr Dunkelman and Roni Roth contributed various terms and had var- ious suggestions that improved this list. Some translations were adopted from the Israeli electronic signature law, 2001.
c Eli Biham - May 3, 2005 617 Proposal for Translating Cryptology Terms to Hebrew (21)
General Terms
Cryptography
- ✁✂
Cryptology
- ✁✂
Cryptanalysis
✁✕ ✂ ✓ ✑✖ ✞ ✄ ✂ ☎ ✟Cryptographer
✗ ✑ ✆ ✓ ✟ ✘ ✙ ✓ ✚ ✎ ✗ ✄✒Cryptanalyst
- ✛
Encryption
✁ ✑ ✄ ✒ ✁Decryption
✜ ✝ ✑ ✚ ✄Cipher
✗ ✄ ✝ ✒Cryptosystem
✁ ✑ ✄✒ ✁ ☛ ✍ ☎ ✚ ✙Plaintext
✂ ✝ ✓ ✆ ✌ ☛ ✍Ciphertext
☎ ☛ ☞ ✌ ☛ ✍Key
✜ ☛ ✄ ✙Password
✖ ✙ ☞ ✂ ☞One-Time Pad
✂ ✙ ✚ ✄✣✢ ✤ ✜ ✜ ☛ ✄ ✙Key Distribution, Key Exchange
- ☛
Key space
☛✝ ✜ ☛ ✄ ✙ ✌ ✜☎ ✙c Eli Biham - May 3, 2005 618 Proposal for Translating Cryptology Terms to Hebrew (21)
Types of Attacks
Attack
✁ ✄ ✟ ☛ ✁Ciphertext Only Attack
✤ ✌ ✓ ✌ ☎ ☛ ☞ ✌ ☛ ✍ ☛ ✄ ✟ ☛ ✁Known Plaintext Attack
✚ ✝ ✤✂ ✂ ✝ ✓ ✆ ✌ ☛ ✍ ☛ ✄ ✟ ☛ ✁Chosen Plaintext Attack
☎ ✜ ✌ ✑ ✂ ✝ ✓ ✆ ✌ ☛✍ ☛ ✄ ✟ ☛ ✁Adaptive Attack
☛ ✓ ✆ ☛ ☞ ✙ ✁ ✄ ✟ ☛ ✁Chosen Key Attack
☎ ✜✌ ✑ ✜ ☛ ✄ ✙ ☛ ✄ ✟ ☛ ✁Exhaustive Search Attack
✁ ✒ ✙ ✙ ✘ ✝ ✄ ✜ ☛ ✄ ✟ ☛ ✁Dictionary Attack
✗ ✝ ✓ ✂ ✙ ☛ ✄ ✟ ☛ ✁Meet in the Middle Attack
✚ ✒ ✙ ✖ ✌ ✁ ✘ ✂ ✆ ✄ ☛ ✄ ✟ ☛ ✁c Eli Biham - May 3, 2005 619 Proposal for Translating Cryptology Terms to Hebrew (21)
Symmetric Ciphers Terms
Block Cipher
✔✂ ✟ ✝ ✓ ✌ ✗ ✄✝ ✒Stream Cipher
✥ ✞ ✘ ✗ ✄✝ ✒Round
✌ ✓ ✘Key Schedule
☛ ✝ ✜ ☛ ✄ ✙ ✤ ✝ ✌ ✚Subkey
✜ ☛ ✄ ✙ ☛ ☛Weak Key
✘ ✓ ✜ ✜ ☛ ✄ ✙Double Encryption
✗ ✄✝ ✒ ✢ ✝ ✤Triple Encryption
✗ ✄✝ ✒ ✢ ☛ ✓ ☛Mode of Operation
- ✓
Differential Cryptanalysis
☛✂ ✓ ✖ ✂ ✒ ✑ ☎ ✄ ✂ ✤ ✁ ✕ ✂ ✓ ✑ ✖ ✞ ✄ ✂ ☎ ✟Linear Cryptanalysis
☛✂ ☎ ✖ ✑ ✂ ✓ ✁✕ ✂ ✓ ✑ ✖ ✞ ✄✂ ☎ ✟Characteristic
✁ ✑ ✝ ✍ ☛Differential
✓ ✖ ✂ ✒ ✑ ☎ ✄ ✂ ✤Linear Feedback Shift Register
✂ ☎ ✖ ✑ ✂ ✓ ✌ ✝ ✘ ✙ ✔✚ ✁ ✕ ✕ ✁ ☎ ✆✝ ✖c Eli Biham - May 3, 2005 620 Proposal for Translating Cryptology Terms to Hebrew (21)