General Terms Cryptography Cryptology Cryptanalysis - - PowerPoint PPT Presentation

general terms
SMART_READER_LITE
LIVE PREVIEW

General Terms Cryptography Cryptology Cryptanalysis - - PowerPoint PPT Presentation


slide-1
SLIDE 1

Proposal for Translating Cryptology Terms to Hebrew

Yossi Markovitz initiated this list. Ron Irmai, Shraga Irmai, Adi Shamir, Moti Yung, Orr Dunkelman and Roni Roth contributed various terms and had var- ious suggestions that improved this list. Some translations were adopted from the Israeli electronic signature law, 2001.

c Eli Biham - May 3, 2005 617 Proposal for Translating Cryptology Terms to Hebrew (21)

General Terms

Cryptography

  • ✁✂
✄☎ ✆✝ ✞ ✄ ✂ ☎ ✟✡✠ ☎ ☛☞ ☛✌ ✂ ☛✍ ✎✏✠ ☛✝ ✑ ✄✒

Cryptology

  • ✁✂
✆✝ ✓ ✝ ✞ ✄ ✂ ☎ ✟ ✎✏✠ ✔ ✂ ✑ ✄✒ ✁ ☛ ☎ ✝ ☛

Cryptanalysis

✁✕ ✂ ✓ ✑✖ ✞ ✄ ✂ ☎ ✟

Cryptographer

✗ ✑ ✆ ✓ ✟ ✘ ✙ ✓ ✚ ✎ ✗ ✄✒

Cryptanalyst

✂ ✖ ✓ ✆ ✎ ✠ ✞ ☞ ✂ ✓ ✑ ✖ ✞ ✄ ✂ ☎ ✟

Encryption

✁ ✑ ✄ ✒ ✁

Decryption

✜ ✝ ✑ ✚ ✄

Cipher

✗ ✄ ✝ ✒

Cryptosystem

✁ ✑ ✄✒ ✁ ☛ ✍ ☎ ✚ ✙

Plaintext

✂ ✝ ✓ ✆ ✌ ☛ ✍

Ciphertext

☎ ☛ ☞ ✌ ☛ ✍

Key

✜ ☛ ✄ ✙

Password

✖ ✙ ☞ ✂ ☞

One-Time Pad

✂ ✙ ✚ ✄✣✢ ✤ ✜ ✜ ☛ ✄ ✙

Key Distribution, Key Exchange

✝ ✜ ☛ ✄ ✙ ☛ ✄ ✓ ✜ ✁ ✎✏✠ ☛✝ ✜ ☛ ✄ ✙ ☛✒ ✄ ✁

Key space

☛✝ ✜ ☛ ✄ ✙ ✌ ✜☎ ✙

c Eli Biham - May 3, 2005 618 Proposal for Translating Cryptology Terms to Hebrew (21)

Types of Attacks

Attack

✁ ✄ ✟ ☛ ✁

Ciphertext Only Attack

✤ ✌ ✓ ✌ ☎ ☛ ☞ ✌ ☛ ✍ ☛ ✄ ✟ ☛ ✁

Known Plaintext Attack

✚ ✝ ✤✂ ✂ ✝ ✓ ✆ ✌ ☛ ✍ ☛ ✄ ✟ ☛ ✁

Chosen Plaintext Attack

☎ ✜ ✌ ✑ ✂ ✝ ✓ ✆ ✌ ☛✍ ☛ ✄ ✟ ☛ ✁

Adaptive Attack

☛ ✓ ✆ ☛ ☞ ✙ ✁ ✄ ✟ ☛ ✁

Chosen Key Attack

☎ ✜✌ ✑ ✜ ☛ ✄ ✙ ☛ ✄ ✟ ☛ ✁

Exhaustive Search Attack

✁ ✒ ✙ ✙ ✘ ✝ ✄ ✜ ☛ ✄ ✟ ☛ ✁

Dictionary Attack

✗ ✝ ✓ ✂ ✙ ☛ ✄ ✟ ☛ ✁

Meet in the Middle Attack

✚ ✒ ✙ ✖ ✌ ✁ ✘ ✂ ✆ ✄ ☛ ✄ ✟ ☛ ✁

c Eli Biham - May 3, 2005 619 Proposal for Translating Cryptology Terms to Hebrew (21)

Symmetric Ciphers Terms

Block Cipher

✔✂ ✟ ✝ ✓ ✌ ✗ ✄✝ ✒

Stream Cipher

✥ ✞ ✘ ✗ ✄✝ ✒

Round

✌ ✓ ✘

Key Schedule

☛ ✝ ✜ ☛ ✄ ✙ ✤ ✝ ✌ ✚

Subkey

✜ ☛ ✄ ✙ ☛ ☛

Weak Key

✘ ✓ ✜ ✜ ☛ ✄ ✙

Double Encryption

✗ ✄✝ ✒ ✢ ✝ ✤

Triple Encryption

✗ ✄✝ ✒ ✢ ☛ ✓ ☛

Mode of Operation

✝ ✚ ✄ ☛ ✗ ✄ ✝ ✖ ✎ ✠ ✓ ✝ ✚ ✄ ☛ ✤ ✝ ✙

Differential Cryptanalysis

☛✂ ✓ ✖ ✂ ✒ ✑ ☎ ✄ ✂ ✤ ✁ ✕ ✂ ✓ ✑ ✖ ✞ ✄ ✂ ☎ ✟

Linear Cryptanalysis

☛✂ ☎ ✖ ✑ ✂ ✓ ✁✕ ✂ ✓ ✑ ✖ ✞ ✄✂ ☎ ✟

Characteristic

✁ ✑ ✝ ✍ ☛

Differential

✓ ✖ ✂ ✒ ✑ ☎ ✄ ✂ ✤

Linear Feedback Shift Register

✂ ☎ ✖ ✑ ✂ ✓ ✌ ✝ ✘ ✙ ✔✚ ✁ ✕ ✕ ✁ ☎ ✆✝ ✖

c Eli Biham - May 3, 2005 620 Proposal for Translating Cryptology Terms to Hebrew (21)

slide-2
SLIDE 2

Hashing Terms

Hash Function

  • scrambling
✁ ✕ ✓ ✝ ✌ ☎ ✚ ✎ ☛✝ ✒ ✙ ☛ ☛ ✂ ✒ ✟ ✑✝ ✄

One Way Function

☛ ✂ ✑✝ ✝ ✍ ✢ ✤ ✜ ✁ ✂ ✒ ✟ ✑✝ ✄

One Way Hash Function

☛✂ ✑✝ ✝ ✍ ✢ ✤ ✜ ☛✝ ✒ ✙ ☛ ☛✂ ✒ ✟ ✑ ✝ ✄

Hash Value

☛✂ ✒ ✙ ☛

Message Authentication Code

☛ ✝ ✚ ✤ ✝ ✁ ☛✝ ✙ ✖ ✤ ✝ ✟

Birthday Paradox

☛ ✤ ✓ ✁ ✁ ✔ ✝ ✂ ☞ ✟ ✝ ✤☎ ✄

Birthday Attack

☛ ✤ ✓ ✁ ✔ ✝ ✂ ☛ ✄ ✟ ☛ ✁

Collision

☛✝ ✘ ✆ ✑ ☛ ✁

Collision Free Hash Function

☛ ✝ ✂ ✝ ✘ ✆ ✑ ☛ ✁ ✖ ✓ ✓ ☛ ✝ ✒ ✙ ☛ ☛ ✂ ✒ ✟ ✑✝ ✄

Compression Function

✁ ☞ ✂ ✜ ✤ ☛✂ ✒ ✟ ✑✝ ✄

Padding

✤ ✝ ✄ ✂ ☎

c Eli Biham - May 3, 2005 621 Proposal for Translating Cryptology Terms to Hebrew (21)

Public Key Terms

Public Key Cryptography

✂ ✌ ✙ ✝ ✄ ✜ ☛ ✄ ✙ ☛ ✝ ✑ ✄✒

Public Key

☎ ✝ ✌ ✒ ✎ ✂ ✌ ✙ ✝ ✄ ✜ ☛ ✄ ✙
  • ✔✂
✝ ☞ ✙ ✔✂ ✓ ✚ ✌ ✝ ✓ ✘✂ ✁ ✖ ✂ ✌ ✙ ✝ ✄ ✌ ✔ ☞ ☎ ✝ ✄ ✙ ✖ ✝ ✁
☎ ✝ ✌ ✒ ✝ ✑ ✂ ✖ ✜ ☛ ✄ ✙ ✁ ✁ ✘✚ ✙ ✓

Secret (Private) Key

✂ ✞ ☎ ✄ ✎ ✂ ✤ ✝ ☞ ✜ ☛ ✄ ✙

Digital Signature

☛ ✂ ☛ ☎ ✄☞ ✁ ✙ ✂ ☛ ✜✡✠ ☛✂ ✑✝ ☎ ✞ ✟ ✓ ✖ ✁ ✙ ✂ ☛ ✜

Authentication

☛ ✝ ✙ ✖

Identification

✂ ✝ ✁ ✕

Public Key Infrastructure

✂ ✌ ✙ ✝ ✄ ✜ ☛ ✄ ✙ ☛ ✂ ☛ ✘ ☛

Certificate

☎ ✝ ✘ ✂ ✖ ✠ ☛ ✂ ✑ ✝ ☎ ✞ ✟ ✓ ✖ ✁ ✤ ✝ ✚ ☛

Certification Authority

☛☎ ✘ ✖ ✙ ☛✝ ✘☎ ✠ ☎ ✘ ✖ ✙ ✔☎ ✝ ✆

Certificate Revocation List

✔✂ ☎ ✝ ✘ ✖ ✂ ✓ ✝ ✞ ✌ ☛ ✙ ✂ ✘☎

Quadratic Sieve

☛✂ ✚ ✝ ✌ ☎ ✁ ✄ ✑

Trapdoor One-Way Function

☛ ✤ ✝ ✍ ✓ ✙ ☛ ✓ ✤ ✔✚ ☛✂ ✑✝ ✝ ✍ ✢ ✤ ✜ ✁✂ ✒ ✟ ✑ ✝ ✄

c Eli Biham - May 3, 2005 622 Proposal for Translating Cryptology Terms to Hebrew (21)

Number Theory Terms

Number Theory

✔✂ ☎ ✄☞ ✙ ✁ ☛ ☎ ✝ ☛

Factoring

✟ ✝ ☎ ✂ ✄

Factor

✔☎ ✝ ✆

Prime Factor

✂ ✑✝ ✘ ✖ ☎ ✔☎ ✝ ✆

Discrete Logarithm

✂ ✞ ☎ ✟ ☞ ✂ ✤ ✔ ☛ ✂ ☎ ✆✝ ✓

Modulus

☞ ✝ ✓ ✝ ✤ ✝ ✙

Modular Arithmetic

✂ ☎ ✓ ✝ ✤ ✝ ✙ ✗ ✝ ✌ ✘ ✜

Exponent

✁✂ ☎ ✚ ✙

c Eli Biham - May 3, 2005 623 Proposal for Translating Cryptology Terms to Hebrew (21)

Zero Knowledge Terms

Zero Knowledge Proof

✚ ✤✂ ☞ ✄ ✖ ☛ ✜✍ ✝ ✁

Interactive Proof

☛ ✂ ✌ ✂ ✞ ✟ ✖ ☎ ✞ ✑ ✂ ✖ ✁ ✜✍ ✝ ✁

Zero Knowledge Interactive Proof

☛ ✂ ✌ ✂ ✞ ✟ ✖ ☎ ✞ ✑ ✂ ✖ ✚ ✤ ✂ ☞ ✄ ✖ ☛ ✜✍ ✝ ✁

c Eli Biham - May 3, 2005 624 Proposal for Translating Cryptology Terms to Hebrew (21)

slide-3
SLIDE 3

Secret Sharing Terms

Secret Sharing

✝ ☞ ☛ ✟ ✝ ✓ ✜ ✎✏✠ ✤ ✝ ☞ ✥ ✝ ☛ ✘

Threshold Scheme

✥ ☞ ☛ ✙ ✍ ☞

Share

✓ ✜ ✎✏✠
  • SHETEF
✁ ✥ ☛ ✘

Share Holder

✥ ☛ ✝ ✘
  • ✔✂
✙ ☎ ✝ ✆ ✁ ✌ ☎ ✁ ✗ ✂ ✌ ✥ ✝ ☛ ✂ ✘✌ ☛ ✟ ✓ ✜ ☛ ✙ ✁ ✎ ✁ ✂ ✑ ✙ ✔ ✆ ☛ ✝ ✂ ✁ ✓ ✓ ✝ ✍ ✂

Share

✞ ✓ ✜ ✁ ☎ ✂ ✌ ✚ ✁ ✓ ✓ ✝ ✍ ✂
✝ ✂ ✑ ✙ ✓ ✘ ✘ ✖ ☎ ✙ ☎ ✤ ✆✝ ✙ ☎ ✄☞ ✙ ✂ ✓ ✚ ✌ ✝ ✖ ✝ ✖ ✎ ✌ ✝ ☎ ✟ ☎ ✝

c Eli Biham - May 3, 2005 625 Proposal for Translating Cryptology Terms to Hebrew (21)

Other Terms

Digital Cash, Electronic Money

✂ ☛ ☎ ✄☞ ✥ ☞ ✍

Covert Channel, Subliminal Channel

✂ ✝ ☞ ✜ ✂ ✝ ☎ ✚

Handshake

✔ ✂ ✂ ✤ ✂ ☛ ✒ ✂ ✜ ✓

Impersonation

☛✝ ✕ ✜ ☛ ✁

Random Number

✂ ✖ ☎ ✟ ✖ ☎ ✄☞ ✙

Pseudo-Random Number

✁ ☎ ✝ ✖ ✍ ✓ ✢ ✂ ✖ ☎ ✟ ✖ ☎ ✄☞ ✙

Pseudo-Random Sequence

✁ ☎ ✝ ✖ ✍ ✓ ✢ ☛✂ ✖ ☎ ✟ ✖ ✁ ☎ ✤ ☞

Seed

✗ ✝ ✚ ☎ ✕

Information Theory

✚ ✤ ✂ ✙ ✁ ☛☎ ✝ ☛

Entropy

✁✂ ✄✝ ☎ ✞ ✑ ✖

Trusted Center

✗ ✂ ✙ ✖ ✕ ✍ ☎ ✙

c Eli Biham - May 3, 2005 626 Proposal for Translating Cryptology Terms to Hebrew (21)