পরিশিষ্ট:ক্রিপ্টোগ্রাফি পরিভাষা
- Plaintext
- encryption- গোপনায়ন/সঙ্কেতায়ন
- ciphertext- সাঙ্কেতিক লেখা
- cryptograph
- cryptogram
- encryption algorithm- গোপনায়নের পদ্ধতি
- encryption key- সঙ্কেতায়নের চাবি
- decryption algorithm- সঙ্কেতমুক্তায়নের পদ্ধতি
- decryption key
- cryptographic algorithm
- cipher system
- Interceptor
- cryptography- সঙ্কেতবিদ্যা
- cryptology
- cryptanalysis
- cryptanalyst
- worst case condition- নিকৃষ্টতম পরিস্থিতি
- Cipher
- Additive Cipher
- Block Cipher
- Caesar Cipher
- Monoalphabetic Cipher
- Playfair Cipher
- Polyalphabetic Cipher
- Simple Substitution Cipher
- Stream Cipher
- keystream sequence
- Transposition Cipher
- Vernam Cipher
- Vigenere Cipher
- Super-encryption
- Cipher System
- Asymmetric Cipher System
- Conventional Cipher System
- One-Key Cipher System
- Public Key Cipher System
- Secret Key Cipher System
- Symmetric Cipher System
- Exhaustive Key Search
- Brute Force Attack
- Chosen Plaintext Attack
- Ciphertext-only Attack
- Known Plaintext Attack
- Public Key Attack
- Man-in-the-middle attack
- One-time Pad
- Perfect Secrecy
- Mode of Operation
- Electronic Codebook Mode (ECB)
- Cipher Block Chaining (CBC) mode
- Cipher Feedback (CFB) mode
- Hash Function
- digital fingerprint
- message digest
- hash
- Key- চাবি
- Back-up Key- সংরক্ষণ চাবি
- Change Key
- Decryption Key
- Destruction Key
- Distribution Key
- Key-encrypting key
- Encryption Key
- Establishment Key
- Generation Key
- Key Hierarchy
- Master Key
- Private Key
- Public Key
- Recovery Key
- Session Key
- Signature Key
- Storage Key
- Usage Key
- Verification Key
- Working Key
- Digital Signature
- Rijndael
- IDEA
- El Gamal
- RSA
- Digital Signature Standard (DSS).
- Data Encryption Standard (DES)
- Advanced Encryption Standard (AES)
- Authentication protocol
- Data Origin Authentication
- Entity Authentication
- One-way Authentication
- Protocol Authentication
- Two-way Authentication
- Bigram
- Biometric
- CAST
- Key Certification Center
- Key Distribution Center
- Key Translation Center
- Trusted (Management) Center
- Certificate
- Certificate Revocation List (CRL)
- Certification Authority (CA)
- Certification Hierarchy
- Cross-Certification
- Revocation
- Coding Homophonic
- Collision
- Communications-Electronic Security Group (CESG)
- Completeness
- Confidentiality
- Confusion
- Controlled Access Broadcast Network
- Cover Time
- Triple DES
- Data Integrity
- Decryption Algorithm
- key establishment protocol
- Diffie-Hellman Protocol
- Diffusion
- Digital Fingerprint
- Digital Signature Standard (DSS)
- Discrete Logarithm
- E-Commerce
- Electronic Frontier Foundation (EEF) 79
- Encryption Algorithm
- Enigma cipher
- Hub and Spoke Environment
- Many-to-many Environment
- Point-to-Point Environment
- Factorization
- General Number Field Sieve (GNFS)
- Identity
- Identity Theft
- Identity-based Public Key Cryptography
- Kasiski Test
- Key Life Cycle
- Key Management
- Hybrid Key Management
- Exhaustive Key Search
- Internet Key Search
- Letter Frequencies
- Message Authentication Code
- Modular Arithmetic
- National Institute of Standards (NIST)
- Non-repudiation
- Personal Identification Number (PIN)
- Pretty Good Privacy (PGP)
- Identity-based Public Key Cryptography
- Public Key Infrastructure (PKI)
- Quantum Cryptography
- RC5
- Registration Authority (RA)
- Regulation of Investigatory Powers Act 2000
- Secret Sharing Schemes
- Secure Sockets Layer (SSL)
- server-centric approach
- Tamper-resistant Security Module (TRSM)
- Transport Layer Security (TLS)
- Trusted Third Party (TTP)
- Validation Authority (VA)
- Web of Trust