GLOSSARY ENTRY (DERIVED FROM QUESTION BELOW) | ||||
---|---|---|---|---|
|
02:05 Jun 26, 2001 |
English to Spanish translations [PRO] Tech/Engineering | |||||
---|---|---|---|---|---|
|
| ||||
| Selected response from: two2tango Argentina Local time: 19:19 | ||||
Grading comment
|
funcion resumen=hash function Explanation: yahoo suerte couldn't find the 2nd! |
| |
Login to enter a peer comment (or grade) |
función hash - documento hash Explanation: This term is not often translated and is left as HASH. I've put a link to a page below. Hope it helps. Good luck, Sarah. Reference: http://www.gnupg.org/gph/es/manual/x232.html |
| |
Login to enter a peer comment (or grade) |
Ver lo que sigue. Explanation: CHAP (Challenge-Handshake Authentication Protocol) An authentication technique where after a link is established, a server sends a challenge to the requestor. The requestor responds with a value obtained by using a one-way hash function. The server checks the response by comparing it its own calculation of the expected hash value. If the values match, the authentication is acknowledged otherwise the connection is usually terminated. Checksum or hash A checksum is a count of the number of bits in a transmission unit that is included with the unit so that the receiver can check to see whether the same number of bits arrived. If the counts match, it's assumed that the complete transmission was received. HMAC (Header Message Authentication Codes ) HMAC is a hash function based message authentication code that was designed to meet the requirements of the IPSEC working group in the IETF, and is now a standard. http://www.ssimail.com/Glossary.htm hash A hash is a unique short-form identifier, a "fingerprint" of something more complicated. One simple application is to create a file name that isn't already in use -- and also isn't unnecessarily long, since you want a low-dimensional search space that can be scanned rapidly. Using the seconds and minutes fields of file modification time stamps often suffices for a hash; a document can also be hashed by using the least significant bits of a checksum. http://faculty.washington.edu/wcalvin/bk9gloss.html Hash functions A hash function H is a transformation that takes a variable-size input m and returns a fixed-size string, which is called the hash value h (that is, h = H(m)). Hash functions with just this property have a variety of general computational uses, but when employed in cryptography the hash functions are usually chosen to have some additional properties. The hash value represents concisely the longer message or document from which it was computed; one can think of a message digest as a "digital fingerprint" of the larger document. Perhaps the main role of a cryptographic hash function is in the provision of digital signatures. Since hash functions are generally faster than digital signature algorithms, it is typical to compute the digital signature to some document by computing the signature on the document's hash value, which is small compared to the document itself. Additionally, a digest can be made public without revealing the contents of the document from which it is derived. This is important in digital timestamping where, using hash functions, one can get a document timestamped without revealing its contents to the timestamping service. HASH: To HASH information, means to produce a fixed length result (output) of that information (input) through a "one-way" mathematical computation. "One-way" refers to the hash process being computationally impossible to reverse, in order to derive the original input. Hash functions can be used to create message digests. In essence the message digest is a tiny fingerprint of the original input. If one single "bit" of data is changed, the "fingerprint" will no longer match to the corresponding "body" of information. Hash functions can greatly reduce the time it takes to verify the integrity of 100% of a huge document, by simply comparing the authenticated message digest. MD2, MD5 and SHA1 are examples of hash functions used to create message digests. MESSAGE DIGEST: A unique value resulting from performing a hash function on a message. http://www2.entegrity.com/products/glossary.shtml. Digital Signature A digital signature is an electronic analog to a written personal signature; a logical hash (mathematical summary) of information enciphered using an asymmetric key unique to the signer. A digital signature can be used to provide evidence of the origin of a message. http://www-4.ibm.com/software/security/registry/library/publ... Message Digest: Similar to a hash function. A message digest creates a small output value when given a file as input. If the same file later gives a different message digest output number then it's probably been tampered with in the interim. http://www.ecommerce-scotland.org/level4.cfm?item_ID=159. Encarta: to hash 1. COMPUTING apply algorithm to a string: to apply an algorithm to a character string, especially in order to find an address of a record Sugerencias: 1. aplicar la función de destilamiento / resúmen sobre un documento 2. función hash / de resúmen o destilamiento Revista Electrónica de Derecho Informático - Protocolo SET. - [ Translate this page ] ... La firma digital se basa en la unión de dos elementos: Los sistemas de encriptación asimétricos y las funciones de resumen o destilamiento (hash). ... publicaciones.derecho.org/redi/No._03_-_Octubre_de_1998/ ramos3 3. documento resumido 4.resúmen de mensaje Espero haberte ayudado. D arriba |
| |
Login to enter a peer comment (or grade) |
función de troceo - documento troceado Explanation: TO HASH = trocear HASH FUNCTION = función de troceo HASHED DOCUMENT = documento troceado MESAGE DIGEST = resumen de mensaje Fuentes: El glosario TERMITE - TERMInology of TElecommunications - de la International Telecommunications Union (ITU) traduce "hash" como "troceo". Ver las siguientes entradas y definiciones: Serial number: GO0417, Modified on: June 2001 English: hash-code Source: ITU-T, Rec. X.843 (2000), 3 Spanish: código de troceo Source: UIT-T, Rec. X.843 (2000), 3 Serial number: GO0418, Modified on: June 2001 English: hash-value Source: ITU-T, Rec. X.843 (2000), 3 Spanish: valor de troceo Source: UIT-T, Rec. X.843 (2000), 3 Serial number: GO0380, Modified on: June 2001 English: hash representation Source: ITU-T, Rec. X.842 (2000), 7.1.1 Spanish: representación de troceo Source: UIT-T, Rec. X.842 (2000), 7.1.1 Serial number: GO0460, Modified on: June 2001 English: hash algorithm Source: ITU-T, Rec. X.843 (2000), B.1 Spanish: algoritmo de troceo Source: UIT-T, Rec. X.843 (2000), B.1 Serial number: ZZ5755, Modified on: June 1998 English: one-way hash Source: ITU-T, draft new Rec. J.93 (1998) Spanish: troceo unidireccional Source: UIT-T, proyecto nueva Rec. J.93 (1998) Definiciones de ITU: Definition: A mathematical process or algorithm whereby a variable length message is changed into a fixed length digital word, such that it is very difficult to calculate the original message from the word, and also very difficult to find a second message with the same word. Definition: Algoritmo matemático por el que un mensaje de longitud variable se transforma en una palabra digital de longitud fija, de manera que es muy difícil calcular el mensaje original a partir de la palabra, y también muy difícil encontrar un segundo mensaje con la misma palabra. en cuanto al verbo, se usa "trocear", ver referencias: www.ei.uvigo.es/~rlaza/teoria/Busqueda_Ordenacion.PDF web.jet.es/abacus/tem13.html en cuanto a message digest, el mismo glosario provee: Serial number: GO0378, Modified on: June 2001 English: message digest Source: ITU-T, Rec. X.842 (2000), 7.1 Spanish: resumen de mensaje Source: UIT-T, Rec. X.842 (2000), 7.1 |
| |
Grading comment
| ||
Login to enter a peer comment (or grade) |
función mezcla Explanation: suerte |
| |
Login to enter a peer comment (or grade) |
...función resumen... Explanation: Since you're talking of functions, this would be the translation for MD function... Take a look at Eurodicautom, Section Informatics... Reference: http://eurodic.ip.lu/cgi-bin/edicbin/EuroDicWWW.pl |
| |
Login to enter a peer comment (or grade) |
Login or register (free and only takes a few minutes) to participate in this question.
You will also have access to many other tools and opportunities designed for those who have language-related jobs (or are passionate about them). Participation is free and the site has a strict confidentiality policy.