empreinte

English translation: fingerprint / hash

GLOSSARY ENTRY (DERIVED FROM QUESTION BELOW)
French term or phrase:empreinte
English translation:fingerprint / hash
Entered by: Charles Davis

09:06 Feb 25, 2016
French to English translations [PRO]
Computers (general) / data protection
French term or phrase: empreinte
I am translating an article on data protection in information systems and am uncertain how to translate the term ‘empreinte’. This appears in two contexts;
1) Referring to passwords: calculer les empreintes de mots de passe de manière sécurisée
2) Referring to user accounts: Afin d'empêcher la réutilisation des empreintes d’un compte d'utilisateur local d’une machine à une autre, il faut soit utiliser des mots de passe différents pour les comptes locaux d'administration, soit interdire la connexion à distance via ces comptes.

I think in both cases the term refers to an electronic record or memory of data, but I would appreciate help with the correct technical translation of ‘empreinte’ : is this simply imprint?

Thanks in advance
Sue
Sue Davis
France
Local time: 18:32
fingerprint
Explanation:
The result of applying a hash function:

"Donc, une fonction de hachage, c’est de façon très simplifiée une fonction mathématique qui, en fonction de ce qu’on lui donne à manger en entrée, va vous sortir une chaîne de longueur fixée à l’avance : c’est ce qu’on appelle l’empreinte (ou le condensé, ou encore la somme de contrôle), une suite de caractères assez courte (tout est relatif hein) représentant le texte qu’il condense. Ces empreintes sont beaucoup utilisées pour la signature électronique, et doivent être rapides à calculer afin de rendre rapide l’identification des données."
http://open-freax.fr/fonctions-de-hachage/

"Hash functions are sometimes called fingerprint functions because they can be used to create a unique fingerprint of a digital file. The fingerprints are usually 128-bit or 160-bit numbers that are displayed as a sequence of hexadecimal digits."
https://www.technologyreview.com/s/402961/fingerprinting-you...

"In computer science, a fingerprinting algorithm is a procedure that maps an arbitrarily large data item (such as a computer file) to a much shorter bit string, its fingerprint, that uniquely identifies the original data for all practical purposes just as human fingerprints uniquely identify people for practical purposes. This fingerprint may be used for data deduplication purposes."
https://en.wikipedia.org/wiki/Fingerprint_(computing)


--------------------------------------------------
Note added at 5 hrs (2016-02-25 14:23:59 GMT)
--------------------------------------------------

A reference or two to clarify the relevance to the context:

"If we want to save space instead of time, we can use hashing in another way. Again, we consider the problem of keeping a dictionary of unsuitable passwords. Assume that a password is restricted to be eight ASCII characters, which requires 64 bits (8 bytes) to represent. Suppose we use a hash function to map each word into a 32-bit string. This string will serve as a short fingerprint for the word; just as a fingerprint is a succint way of identifying people, the fingerprint string is a succinct way of identifying a word. We keep the fingerprints in a sorted list. To check if a proposed password is unacceptable, we calculate its fingerprint and look for it on the list, say by a binary search. If the fingerprint is on the list, we declare the password unacceptable."
Probability and Computing: Randomized Algorithms and Probabilistic Analysis, 108
https://books.google.es/books?id=0bAYl6d7hvkC&pg=PA108#v=one...



--------------------------------------------------
Note added at 5 hrs (2016-02-25 14:26:53 GMT)
--------------------------------------------------

However, an alternative, which might be better, is hash:

"Here’s how passwords should be stored in an ideal world: You create an account and provide a password. Instead of storing the password itself, the service generates a “hash” from the password. This is a unique fingerprint that can’t be reversed. For example, the password “password” may turn into something that looks more like “4jfh75to4sud7gh93247g…”. When you enter your password to log in, the service generates a hash from it and checks if the hash value matches the value stored in the database. At no point does the service ever save your password itself to disk."
http://www.howtogeek.com/171236/why-you-should-worry-wheneve...

--------------------------------------------------
Note added at 5 hrs (2016-02-25 14:29:17 GMT)
--------------------------------------------------

See here:

"Les empreintes des mots de passe des comptes utilisateurs sous Windows sont stockées à deux endroits, dans la base de données SAM (Security Accounts Manager), locale pour un système Windows ou dans les structures Active Directory sur un contrôleur de domaine. Cet article propose de fournir les clés afin de pouvoir extraire de manière fiable (la stabilité du système cible ne devant pas être affectée) et sur un maximum de systèmes Windows, aussi bien en 32 bits qu'en 64 bits, les empreintes des comptes locaux d'une part et les empreintes des comptes de domaine d'autre part."
http://connect.ed-diamond.com/MISC/MISC-059/Extraction-des-e...

Windows stores information in the Security Accounts Manager as hashes:
https://books.google.es/books?id=fkVICgAAQBAJ&pg=PA449&lpg=P...

--------------------------------------------------
Note added at 5 hrs (2016-02-25 14:34:21 GMT)
--------------------------------------------------

HASH
I think "empreinte" is what French normally uses for hash:

"On nomme fonction de hachage, de l'anglais hash function (hash : pagaille, désorde, recouper et mélanger) par analogie avec la cuisine, une fonction particulière qui, à partir d'une donnée fournie en entrée, calcule une empreinte servant à identifier rapidement, bien qu'incomplètement, la donnée initiale. Les fonctions de hachage sont utilisées en informatique et en cryptographie. [...]
Le résultat d'une fonction de hachage peut être appelé selon le contexte somme de contrôle, empreinte, empreinte numérique, hash, résumé de message, condensé, condensat, signature ou encore empreinte cryptographique lorsque l'on utilise une fonction de hachage cryptographique."
https://fr.wikipedia.org/wiki/Fonction_de_hachage

On the last term, see:
"The input data is often called the message, and the hash value is often called the message digest or simply the digest."
https://en.wikipedia.org/wiki/Cryptographic_hash_function

--------------------------------------------------
Note added at 2 days3 hrs (2016-02-27 12:43:46 GMT) Post-grading
--------------------------------------------------

Dear Sue,
It's a pleasure, and I'm very glad if it was helpful. I'm sorry the answer turned out a bit messy, but these things tend to grow organically as you look further into it. I'm putting "hash" as well as "fingerprint" in the glossary entry because I think it may be useful to others.
Anyway, best regards
Charles
Selected response from:

Charles Davis
Spain
Local time: 18:32
Grading comment
Dear Charles,
Thanks so much for your very detailed and most helpful response. This isn't my specialist area and the references were most useful - Sue
4 KudoZ points were awarded for this answer



Summary of answers provided
4 +2fingerprint
Charles Davis
2 +1footprint
Ana Vozone


Discussion entries: 1





  

Answers


1 hr   confidence: Answerer confidence 2/5Answerer confidence 2/5 peer agreement (net): +1
footprint


Explanation:
https://www.google.pt/webhp?sourceid=chrome-instant&ion=1&es...

Example sentence(s):
  • Craigslist is always on the lookout for dissertation password footprints or signs that someone is posting dissertation password same or a similar ad again
  • This method is very secure as there are no password footprints inside the SealedJar.
Ana Vozone
Local time: 17:32
Does not meet criteria
Native speaker of: Native in PortuguesePortuguese

Peer comments on this answer (and responses from the answerer)
agree  Katherine Rutter
3 hrs
  -> Thank you, Katherine!
Login to enter a peer comment (or grade)

3 hrs   confidence: Answerer confidence 4/5Answerer confidence 4/5 peer agreement (net): +2
fingerprint


Explanation:
The result of applying a hash function:

"Donc, une fonction de hachage, c’est de façon très simplifiée une fonction mathématique qui, en fonction de ce qu’on lui donne à manger en entrée, va vous sortir une chaîne de longueur fixée à l’avance : c’est ce qu’on appelle l’empreinte (ou le condensé, ou encore la somme de contrôle), une suite de caractères assez courte (tout est relatif hein) représentant le texte qu’il condense. Ces empreintes sont beaucoup utilisées pour la signature électronique, et doivent être rapides à calculer afin de rendre rapide l’identification des données."
http://open-freax.fr/fonctions-de-hachage/

"Hash functions are sometimes called fingerprint functions because they can be used to create a unique fingerprint of a digital file. The fingerprints are usually 128-bit or 160-bit numbers that are displayed as a sequence of hexadecimal digits."
https://www.technologyreview.com/s/402961/fingerprinting-you...

"In computer science, a fingerprinting algorithm is a procedure that maps an arbitrarily large data item (such as a computer file) to a much shorter bit string, its fingerprint, that uniquely identifies the original data for all practical purposes just as human fingerprints uniquely identify people for practical purposes. This fingerprint may be used for data deduplication purposes."
https://en.wikipedia.org/wiki/Fingerprint_(computing)


--------------------------------------------------
Note added at 5 hrs (2016-02-25 14:23:59 GMT)
--------------------------------------------------

A reference or two to clarify the relevance to the context:

"If we want to save space instead of time, we can use hashing in another way. Again, we consider the problem of keeping a dictionary of unsuitable passwords. Assume that a password is restricted to be eight ASCII characters, which requires 64 bits (8 bytes) to represent. Suppose we use a hash function to map each word into a 32-bit string. This string will serve as a short fingerprint for the word; just as a fingerprint is a succint way of identifying people, the fingerprint string is a succinct way of identifying a word. We keep the fingerprints in a sorted list. To check if a proposed password is unacceptable, we calculate its fingerprint and look for it on the list, say by a binary search. If the fingerprint is on the list, we declare the password unacceptable."
Probability and Computing: Randomized Algorithms and Probabilistic Analysis, 108
https://books.google.es/books?id=0bAYl6d7hvkC&pg=PA108#v=one...



--------------------------------------------------
Note added at 5 hrs (2016-02-25 14:26:53 GMT)
--------------------------------------------------

However, an alternative, which might be better, is hash:

"Here’s how passwords should be stored in an ideal world: You create an account and provide a password. Instead of storing the password itself, the service generates a “hash” from the password. This is a unique fingerprint that can’t be reversed. For example, the password “password” may turn into something that looks more like “4jfh75to4sud7gh93247g…”. When you enter your password to log in, the service generates a hash from it and checks if the hash value matches the value stored in the database. At no point does the service ever save your password itself to disk."
http://www.howtogeek.com/171236/why-you-should-worry-wheneve...

--------------------------------------------------
Note added at 5 hrs (2016-02-25 14:29:17 GMT)
--------------------------------------------------

See here:

"Les empreintes des mots de passe des comptes utilisateurs sous Windows sont stockées à deux endroits, dans la base de données SAM (Security Accounts Manager), locale pour un système Windows ou dans les structures Active Directory sur un contrôleur de domaine. Cet article propose de fournir les clés afin de pouvoir extraire de manière fiable (la stabilité du système cible ne devant pas être affectée) et sur un maximum de systèmes Windows, aussi bien en 32 bits qu'en 64 bits, les empreintes des comptes locaux d'une part et les empreintes des comptes de domaine d'autre part."
http://connect.ed-diamond.com/MISC/MISC-059/Extraction-des-e...

Windows stores information in the Security Accounts Manager as hashes:
https://books.google.es/books?id=fkVICgAAQBAJ&pg=PA449&lpg=P...

--------------------------------------------------
Note added at 5 hrs (2016-02-25 14:34:21 GMT)
--------------------------------------------------

HASH
I think "empreinte" is what French normally uses for hash:

"On nomme fonction de hachage, de l'anglais hash function (hash : pagaille, désorde, recouper et mélanger) par analogie avec la cuisine, une fonction particulière qui, à partir d'une donnée fournie en entrée, calcule une empreinte servant à identifier rapidement, bien qu'incomplètement, la donnée initiale. Les fonctions de hachage sont utilisées en informatique et en cryptographie. [...]
Le résultat d'une fonction de hachage peut être appelé selon le contexte somme de contrôle, empreinte, empreinte numérique, hash, résumé de message, condensé, condensat, signature ou encore empreinte cryptographique lorsque l'on utilise une fonction de hachage cryptographique."
https://fr.wikipedia.org/wiki/Fonction_de_hachage

On the last term, see:
"The input data is often called the message, and the hash value is often called the message digest or simply the digest."
https://en.wikipedia.org/wiki/Cryptographic_hash_function

--------------------------------------------------
Note added at 2 days3 hrs (2016-02-27 12:43:46 GMT) Post-grading
--------------------------------------------------

Dear Sue,
It's a pleasure, and I'm very glad if it was helpful. I'm sorry the answer turned out a bit messy, but these things tend to grow organically as you look further into it. I'm putting "hash" as well as "fingerprint" in the glossary entry because I think it may be useful to others.
Anyway, best regards
Charles

Charles Davis
Spain
Local time: 18:32
Meets criteria
Native speaker of: English
PRO pts in category: 4
Grading comment
Dear Charles,
Thanks so much for your very detailed and most helpful response. This isn't my specialist area and the references were most useful - Sue

Peer comments on this answer (and responses from the answerer)
agree  James A. Walsh: Absolutely! Great references, too ;-)
1 hr
  -> Thanks, James! I got a bit tied up here :)

agree  Anne Bohy
4 hrs
  -> Thanks, bohy :)
Login to enter a peer comment (or grade)



Login or register (free and only takes a few minutes) to participate in this question.

You will also have access to many other tools and opportunities designed for those who have language-related jobs (or are passionate about them). Participation is free and the site has a strict confidentiality policy.

KudoZ™ translation help

The KudoZ network provides a framework for translators and others to assist each other with translations or explanations of terms and short phrases.


See also:
Term search
  • All of ProZ.com
  • Term search
  • Jobs
  • Forums
  • Multiple search