|
| 1 | +--- |
| 2 | +layout: page |
| 3 | +title: IPCrypt Glossary |
| 4 | +description: A comprehensive glossary of terms related to IPCrypt, encryption, and network security. |
| 5 | +permalink: /glossary/ |
| 6 | +--- |
| 7 | + |
| 8 | +# IPCrypt Glossary |
| 9 | + |
| 10 | +This glossary provides definitions for technical terms related to IPCrypt, encryption, and network security. |
| 11 | + |
| 12 | +## A |
| 13 | + |
| 14 | +### AES (Advanced Encryption Standard) |
| 15 | +A symmetric block cipher widely used worldwide, established by the U.S. National Institute of Standards and Technology (NIST) in 2001. IPCrypt uses AES-128 for its deterministic mode. |
| 16 | + |
| 17 | +### AES-XTS |
| 18 | +A mode of operation for AES that provides encryption for storage devices. IPCrypt uses AES-XTS for its ndx (non-deterministic extended) mode. |
| 19 | + |
| 20 | +### Authentication |
| 21 | +The process of verifying the identity of a user, device, or system. While IPCrypt itself doesn't provide authentication, it can be used as part of a larger security system that includes authentication. |
| 22 | + |
| 23 | +## B |
| 24 | + |
| 25 | +### Block Cipher |
| 26 | +A method of encrypting text in which a cryptographic key and algorithm are applied to a block of data at once as a group rather than to one bit at a time. AES is a block cipher used in IPCrypt. |
| 27 | + |
| 28 | +### Byte |
| 29 | +A unit of digital information that consists of 8 bits. IPCrypt uses a 16-byte (128-bit) key for encryption. |
| 30 | + |
| 31 | +## C |
| 32 | + |
| 33 | +### Cipher |
| 34 | +An algorithm for performing encryption or decryption. |
| 35 | + |
| 36 | +### Ciphertext |
| 37 | +The result of encryption performed on plaintext using an algorithm (cipher). |
| 38 | + |
| 39 | +### Correlation Attack |
| 40 | +An attack where an adversary can link different encrypted values by analyzing patterns or relationships between them. IPCrypt's non-deterministic modes help prevent correlation attacks. |
| 41 | + |
| 42 | +### Cryptography |
| 43 | +The practice and study of techniques for secure communication in the presence of adversaries. |
| 44 | + |
| 45 | +## D |
| 46 | + |
| 47 | +### Decryption |
| 48 | +The process of converting encrypted information back to its original form. |
| 49 | + |
| 50 | +### Deterministic Encryption |
| 51 | +An encryption method that always produces the same ciphertext for a given plaintext and key. IPCrypt's deterministic mode is an example of this. |
| 52 | + |
| 53 | +## E |
| 54 | + |
| 55 | +### Encryption |
| 56 | +The process of converting information into a code to prevent unauthorized access. |
| 57 | + |
| 58 | +### Encryption Key |
| 59 | +A piece of information used in combination with an algorithm to transform plaintext into ciphertext and vice versa. |
| 60 | + |
| 61 | +## F |
| 62 | + |
| 63 | +### Format-Preserving Encryption (FPE) |
| 64 | +A type of encryption that preserves the format of the input data in the output. IPCrypt's deterministic mode is a form of format-preserving encryption for IP addresses. |
| 65 | + |
| 66 | +## I |
| 67 | + |
| 68 | +### IP Address |
| 69 | +A numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. IPCrypt is designed to encrypt both IPv4 and IPv6 addresses. |
| 70 | + |
| 71 | +### IPv4 (Internet Protocol version 4) |
| 72 | +The fourth version of the Internet Protocol, using 32-bit addresses typically represented in dot-decimal notation (e.g., 192.168.1.1). |
| 73 | + |
| 74 | +### IPv6 (Internet Protocol version 6) |
| 75 | +The most recent version of the Internet Protocol, using 128-bit addresses represented in hexadecimal notation (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334). |
| 76 | + |
| 77 | +### IPCrypt |
| 78 | +A specification that defines methods for encrypting and obfuscating IP addresses, providing both deterministic format-preserving and non-deterministic constructions. |
| 79 | + |
| 80 | +### ipcrypt-deterministic |
| 81 | +The deterministic mode of IPCrypt that uses AES-128 to encrypt IP addresses while preserving their format. |
| 82 | + |
| 83 | +### ipcrypt-nd |
| 84 | +The non-deterministic mode of IPCrypt that uses KIASU-BC with an 8-byte tweak to encrypt IP addresses. |
| 85 | + |
| 86 | +### ipcrypt-ndx |
| 87 | +The extended non-deterministic mode of IPCrypt that uses AES-XTS with a 16-byte tweak to encrypt IP addresses. |
| 88 | + |
| 89 | +## K |
| 90 | + |
| 91 | +### Key |
| 92 | +In cryptography, a piece of information used to determine the functional output of a cryptographic algorithm. IPCrypt uses a 16-byte (128-bit) key. |
| 93 | + |
| 94 | +### KIASU-BC |
| 95 | +A tweakable block cipher based on AES. IPCrypt uses KIASU-BC for its nd (non-deterministic) mode. |
| 96 | + |
| 97 | +## N |
| 98 | + |
| 99 | +### Non-Deterministic Encryption |
| 100 | +An encryption method that produces different ciphertexts for the same plaintext and key, typically by incorporating randomness. IPCrypt's nd and ndx modes are non-deterministic. |
| 101 | + |
| 102 | +## P |
| 103 | + |
| 104 | +### Plaintext |
| 105 | +The original, unencrypted message or data. |
| 106 | + |
| 107 | +### Privacy |
| 108 | +The state of being free from unauthorized intrusion or observation. IPCrypt helps protect privacy by encrypting IP addresses. |
| 109 | + |
| 110 | +### Pseudonymization |
| 111 | +A data management and de-identification procedure that replaces private identifiers with fake identifiers or pseudonyms. IPCrypt can be used for IP address pseudonymization. |
| 112 | + |
| 113 | +## R |
| 114 | + |
| 115 | +### RFC (Request for Comments) |
| 116 | +A publication from the Internet Engineering Task Force (IETF) that describes methods, behaviors, research, or innovations applicable to the Internet. IPCrypt addresses privacy concerns raised in RFC6973 and RFC7258. |
| 117 | + |
| 118 | +## S |
| 119 | + |
| 120 | +### Security |
| 121 | +The state of being protected against unauthorized access or harm. IPCrypt contributes to security by protecting sensitive IP address information. |
| 122 | + |
| 123 | +### Symmetric Encryption |
| 124 | +A type of encryption where the same key is used for both encryption and decryption. IPCrypt uses symmetric encryption. |
| 125 | + |
| 126 | +## T |
| 127 | + |
| 128 | +### Tweak |
| 129 | +In cryptography, a tweak is a public, non-secret value that is used to add variability to an encryption scheme. IPCrypt's nd and ndx modes use tweaks to achieve non-deterministic encryption. |
| 130 | + |
| 131 | +### Tweakable Block Cipher |
| 132 | +A block cipher that takes an additional input, the tweak, along with the usual plaintext and key. KIASU-BC and AES-XTS are tweakable block ciphers used in IPCrypt. |
| 133 | + |
| 134 | +## X |
| 135 | + |
| 136 | +### XTS (XEX-based tweaked-codebook mode with ciphertext stealing) |
| 137 | +A mode of operation for block ciphers that provides confidentiality for storage devices. IPCrypt uses AES-XTS for its ndx mode. |
0 commit comments