বিষয়বস্তুতে চলুন

পরিশিষ্ট:ক্রিপ্টোগ্রাফি পরিভাষা

উইকিঅভিধান, মুক্ত অভিধান থেকে
  • Plaintext
  • encryption- গোপনায়ন/সঙ্কেতায়ন
  • ciphertext- সাঙ্কেতিক লেখা
  • cryptograph
  • cryptogram
  • encryption algorithm- গোপনায়নের পদ্ধতি
  • encryption key- সঙ্কেতায়নের চাবি
  • decryption algorithm- সঙ্কেতমুক্তায়নের পদ্ধতি
  • decryption key
  • cryptographic algorithm
  • cipher system
  • Interceptor
  • cryptography- সঙ্কেতবিদ্যা
  • cryptology
  • cryptanalysis
  • cryptanalyst
  • worst case condition- নিকৃষ্টতম পরিস্থিতি
  • Cipher
  • Additive Cipher
  • Block Cipher
  • Caesar Cipher
  • Monoalphabetic Cipher
  • Playfair Cipher
  • Polyalphabetic Cipher
  • Simple Substitution Cipher
  • Stream Cipher
  • keystream sequence
  • Transposition Cipher
  • Vernam Cipher
  • Vigenere Cipher
  • Super-encryption
  • Cipher System
  • Asymmetric Cipher System
  • Conventional Cipher System
  • One-Key Cipher System
  • Public Key Cipher System
  • Secret Key Cipher System
  • Symmetric Cipher System
  • Exhaustive Key Search
  • Brute Force Attack
  • Chosen Plaintext Attack
  • Ciphertext-only Attack
  • Known Plaintext Attack
  • Public Key Attack
  • Man-in-the-middle attack
  • One-time Pad
  • Perfect Secrecy
  • Mode of Operation
  • Electronic Codebook Mode (ECB)
  • Cipher Block Chaining (CBC) mode
  • Cipher Feedback (CFB) mode
  • Hash Function
  • digital fingerprint
  • message digest
  • hash
  • Key- চাবি
  • Back-up Key- সংরক্ষণ চাবি
  • Change Key
  • Decryption Key
  • Destruction Key
  • Distribution Key
  • Key-encrypting key
  • Encryption Key
  • Establishment Key
  • Generation Key
  • Key Hierarchy
  • Master Key
  • Private Key
  • Public Key
  • Recovery Key
  • Session Key
  • Signature Key
  • Storage Key
  • Usage Key
  • Verification Key
  • Working Key
  • Digital Signature
  • Rijndael
  • IDEA
  • El Gamal
  • RSA
  • Digital Signature Standard (DSS).
  • Data Encryption Standard (DES)
  • Advanced Encryption Standard (AES)
  • Authentication protocol
  • Data Origin Authentication
  • Entity Authentication
  • One-way Authentication
  • Protocol Authentication
  • Two-way Authentication
  • Bigram
  • Biometric
  • CAST


  • Key Certification Center
  • Key Distribution Center
  • Key Translation Center
  • Trusted (Management) Center
  • Certificate
  • Certificate Revocation List (CRL)
  • Certification Authority (CA)
  • Certification Hierarchy
  • Cross-Certification
  • Revocation
  • Coding Homophonic
  • Collision
  • Communications-Electronic Security Group (CESG)
  • Completeness
  • Confidentiality
  • Confusion
  • Controlled Access Broadcast Network
  • Cover Time
  • Triple DES
  • Data Integrity
  • Decryption Algorithm
  • key establishment protocol
  • Diffie-Hellman Protocol
  • Diffusion
  • Digital Fingerprint
  • Digital Signature Standard (DSS)
  • Discrete Logarithm
  • E-Commerce
  • Electronic Frontier Foundation (EEF) 79
  • Encryption Algorithm
  • Enigma cipher
  • Hub and Spoke Environment
  • Many-to-many Environment
  • Point-to-Point Environment
  • Factorization
  • General Number Field Sieve (GNFS)


  • Identity
  • Identity Theft
  • Identity-based Public Key Cryptography
  • Kasiski Test
  • Key Life Cycle
  • Key Management
  • Hybrid Key Management
  • Exhaustive Key Search
  • Internet Key Search
  • Letter Frequencies
  • Message Authentication Code
  • Modular Arithmetic
  • National Institute of Standards (NIST)
  • Non-repudiation
  • Personal Identification Number (PIN)
  • Pretty Good Privacy (PGP)
  • Identity-based Public Key Cryptography
  • Public Key Infrastructure (PKI)
  • Quantum Cryptography
  • RC5
  • Registration Authority (RA)
  • Regulation of Investigatory Powers Act 2000


  • Secret Sharing Schemes
  • Secure Sockets Layer (SSL)
  • server-centric approach
  • Tamper-resistant Security Module (TRSM)
  • Transport Layer Security (TLS)
  • Trusted Third Party (TTP)
  • Validation Authority (VA)
  • Web of Trust