Skip to content

Commit 1cfcfce

Browse files
committed
Add glossary of technical terms and concepts
1 parent f82fcf9 commit 1cfcfce

File tree

2 files changed

+139
-0
lines changed

2 files changed

+139
-0
lines changed

www/_config.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -97,6 +97,8 @@ navigation:
9797
url: /code-examples/
9898
- title: FAQ
9999
url: /faq/
100+
- title: Glossary
101+
url: /glossary/
100102
- title: Developer Resources
101103
url: /resources/
102104
- title: Community

www/pages/glossary.md

Lines changed: 137 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,137 @@
1+
---
2+
layout: page
3+
title: IPCrypt Glossary
4+
description: A comprehensive glossary of terms related to IPCrypt, encryption, and network security.
5+
permalink: /glossary/
6+
---
7+
8+
# IPCrypt Glossary
9+
10+
This glossary provides definitions for technical terms related to IPCrypt, encryption, and network security.
11+
12+
## A
13+
14+
### AES (Advanced Encryption Standard)
15+
A symmetric block cipher widely used worldwide, established by the U.S. National Institute of Standards and Technology (NIST) in 2001. IPCrypt uses AES-128 for its deterministic mode.
16+
17+
### AES-XTS
18+
A mode of operation for AES that provides encryption for storage devices. IPCrypt uses AES-XTS for its ndx (non-deterministic extended) mode.
19+
20+
### Authentication
21+
The process of verifying the identity of a user, device, or system. While IPCrypt itself doesn't provide authentication, it can be used as part of a larger security system that includes authentication.
22+
23+
## B
24+
25+
### Block Cipher
26+
A method of encrypting text in which a cryptographic key and algorithm are applied to a block of data at once as a group rather than to one bit at a time. AES is a block cipher used in IPCrypt.
27+
28+
### Byte
29+
A unit of digital information that consists of 8 bits. IPCrypt uses a 16-byte (128-bit) key for encryption.
30+
31+
## C
32+
33+
### Cipher
34+
An algorithm for performing encryption or decryption.
35+
36+
### Ciphertext
37+
The result of encryption performed on plaintext using an algorithm (cipher).
38+
39+
### Correlation Attack
40+
An attack where an adversary can link different encrypted values by analyzing patterns or relationships between them. IPCrypt's non-deterministic modes help prevent correlation attacks.
41+
42+
### Cryptography
43+
The practice and study of techniques for secure communication in the presence of adversaries.
44+
45+
## D
46+
47+
### Decryption
48+
The process of converting encrypted information back to its original form.
49+
50+
### Deterministic Encryption
51+
An encryption method that always produces the same ciphertext for a given plaintext and key. IPCrypt's deterministic mode is an example of this.
52+
53+
## E
54+
55+
### Encryption
56+
The process of converting information into a code to prevent unauthorized access.
57+
58+
### Encryption Key
59+
A piece of information used in combination with an algorithm to transform plaintext into ciphertext and vice versa.
60+
61+
## F
62+
63+
### Format-Preserving Encryption (FPE)
64+
A type of encryption that preserves the format of the input data in the output. IPCrypt's deterministic mode is a form of format-preserving encryption for IP addresses.
65+
66+
## I
67+
68+
### IP Address
69+
A numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. IPCrypt is designed to encrypt both IPv4 and IPv6 addresses.
70+
71+
### IPv4 (Internet Protocol version 4)
72+
The fourth version of the Internet Protocol, using 32-bit addresses typically represented in dot-decimal notation (e.g., 192.168.1.1).
73+
74+
### IPv6 (Internet Protocol version 6)
75+
The most recent version of the Internet Protocol, using 128-bit addresses represented in hexadecimal notation (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334).
76+
77+
### IPCrypt
78+
A specification that defines methods for encrypting and obfuscating IP addresses, providing both deterministic format-preserving and non-deterministic constructions.
79+
80+
### ipcrypt-deterministic
81+
The deterministic mode of IPCrypt that uses AES-128 to encrypt IP addresses while preserving their format.
82+
83+
### ipcrypt-nd
84+
The non-deterministic mode of IPCrypt that uses KIASU-BC with an 8-byte tweak to encrypt IP addresses.
85+
86+
### ipcrypt-ndx
87+
The extended non-deterministic mode of IPCrypt that uses AES-XTS with a 16-byte tweak to encrypt IP addresses.
88+
89+
## K
90+
91+
### Key
92+
In cryptography, a piece of information used to determine the functional output of a cryptographic algorithm. IPCrypt uses a 16-byte (128-bit) key.
93+
94+
### KIASU-BC
95+
A tweakable block cipher based on AES. IPCrypt uses KIASU-BC for its nd (non-deterministic) mode.
96+
97+
## N
98+
99+
### Non-Deterministic Encryption
100+
An encryption method that produces different ciphertexts for the same plaintext and key, typically by incorporating randomness. IPCrypt's nd and ndx modes are non-deterministic.
101+
102+
## P
103+
104+
### Plaintext
105+
The original, unencrypted message or data.
106+
107+
### Privacy
108+
The state of being free from unauthorized intrusion or observation. IPCrypt helps protect privacy by encrypting IP addresses.
109+
110+
### Pseudonymization
111+
A data management and de-identification procedure that replaces private identifiers with fake identifiers or pseudonyms. IPCrypt can be used for IP address pseudonymization.
112+
113+
## R
114+
115+
### RFC (Request for Comments)
116+
A publication from the Internet Engineering Task Force (IETF) that describes methods, behaviors, research, or innovations applicable to the Internet. IPCrypt addresses privacy concerns raised in RFC6973 and RFC7258.
117+
118+
## S
119+
120+
### Security
121+
The state of being protected against unauthorized access or harm. IPCrypt contributes to security by protecting sensitive IP address information.
122+
123+
### Symmetric Encryption
124+
A type of encryption where the same key is used for both encryption and decryption. IPCrypt uses symmetric encryption.
125+
126+
## T
127+
128+
### Tweak
129+
In cryptography, a tweak is a public, non-secret value that is used to add variability to an encryption scheme. IPCrypt's nd and ndx modes use tweaks to achieve non-deterministic encryption.
130+
131+
### Tweakable Block Cipher
132+
A block cipher that takes an additional input, the tweak, along with the usual plaintext and key. KIASU-BC and AES-XTS are tweakable block ciphers used in IPCrypt.
133+
134+
## X
135+
136+
### XTS (XEX-based tweaked-codebook mode with ciphertext stealing)
137+
A mode of operation for block ciphers that provides confidentiality for storage devices. IPCrypt uses AES-XTS for its ndx mode.

0 commit comments

Comments
 (0)