This glossary covers essential cybersecurity and password management terminology from password policies and zero-knowledge encryption to RBAC, API authentication, and compliance frameworks like GDPR and SOC 2.
AES encryption — a symmetric encryption algorithm adopted as the U.S. government standard and widely used globally for securing sensitive data. AES encrypts data in fixed block sizes (128 bits) using key lengths of 128, 192, or 256 bits, with AES-256 providing the strongest security. AES encryption is fast, efficient, and secure against known attacks, making it ideal for encrypting files, databases, communications, and full-disk encryption.
Asymmetric encryption — a cryptographic method that uses two mathematically related keys: a public key for encryption and a private key for decryption. This eliminates the need to share secret keys between parties. Anyone can encrypt data using a recipient's public key, but only the private key holder can decrypt it. Asymmetric algorithms include RSA, elliptic curve cryptography (ECC), and Diffie-Hellman. Asymmetric encryption enables secure key exchange, digital signatures, certificate-based authentication, and encrypted communications without prior key sharing.
Client-side encryption — a security method that performs all cryptographic operations (encryption and decryption) on user devices before data transmission to servers, ensuring servers only receive encrypted data they cannot decrypt. Client-side encryption protects data privacy since service providers, network observers, and server breaches cannot access plaintext content. Encryption keys remain on client devices or derive from user passwords unknown to servers. Client-side encryption enables zero-knowledge architecture where providers cannot access user data.
Encryption — the process of converting readable data (plaintext) into an unreadable format (ciphertext) using cryptographic algorithms and keys to protect information from unauthorized access. Encryption ensures data confidentiality during storage (encryption at rest) and transmission (encryption in transit), preventing interception or theft.
Encryption key — a string of bits used by cryptographic algorithms to transform plaintext into ciphertext (encryption) and ciphertext back to plaintext (decryption). Key strength depends on length (measured in bits) and randomness — longer keys provide exponentially stronger security. Symmetric encryption uses identical keys for encryption and decryption, while asymmetric encryption uses key pairs.
End-to-end encryption — a security method that encrypts data on the sender's device and decrypts it only on the recipient's device, ensuring that intermediary servers, service providers, or network observers cannot access the plaintext content. E2EE uses public-key cryptography where only the communicating parties possess the decryption keys.
Hashing — a cryptographic process that transforms input data of any size into a fixed-length string (hash value or digest) using mathematical algorithms, creating unique digital fingerprints for data integrity verification and password storage. Hash functions are one-way operations—computing hashes from data is easy, but reversing hashes to original data is computationally infeasible. Common hash algorithms include SHA-256, SHA-3, and bcrypt. Hashing verifies file integrity, stores passwords securely without saving plaintext, creates digital signatures, and enables blockchain technology.
Key management — the process that encompasses the complete lifecycle of cryptographic keys: generation, distribution, storage, rotation, backup, and destruction. Effective key management ensures keys are created using strong randomness, stored securely (encrypted, access-controlled), distributed through secure channels, rotated regularly, backed up safely, and destroyed completely when no longer needed. Key management systems (KMS) automate key lifecycle operations, enforce policies, provide audit trails, and integrate with encryption systems.
Password-based key derivation function (PBKDF2) — a cryptographic algorithm that derives encryption keys from passwords by applying hash functions repeatedly (iterations) with salt, making password cracking computationally expensive. PBKDF2 transforms weak user passwords into strong encryption keys suitable for protecting sensitive data. The iteration count (typically 100,000+ for PBKDF2-HMAC-SHA256) determines computational cost, with higher iterations providing stronger protection against brute-force attacks at the cost of performance.
Public key cryptography — a cryptographic system using mathematically linked key pairs (public and private keys) where public keys can be freely distributed while private keys remain secret. Public key cryptography enables secure communications without prior key exchange, digital signatures for authentication and non-repudiation, and secure key establishment. The public key encrypts data or verifies signatures, while the private key decrypts data or creates signatures. Public key infrastructure (PKI) manages public key distribution through digital certificates.
Salting — a cryptographic technique adding random data (salt) to passwords before hashing, ensuring identical passwords produce different hash values and preventing rainbow table attacks. Each password receives a unique random salt stored alongside the hash, making precomputed hash attacks infeasible since attackers must compute hashes for each salt individually. Salting protects against password cracking when password databases are compromised, even for common passwords.
Symmetric encryption — an encryption that uses a single shared secret key for both encrypting and decrypting data, requiring secure key distribution between communicating parties. Symmetric algorithms like AES, ChaCha20, and DES are computationally efficient, enabling fast encryption of large data volumes. Symmetric encryption excels at protecting data at rest (encrypted databases, files) and securing communications when parties can securely exchange keys.
Vault encryption — a security method that protects password vaults and secrets repositories by encrypting all stored data using strong cryptographic algorithms, ensuring credentials remain secure even if storage is compromised. Vault encryption typically uses AES-256 encryption with keys derived from master passwords or encryption keys stored in hardware security modules. Modern password managers implement vault encryption with zero-knowledge architecture where encryption occurs client-side and providers cannot access vault contents.
Zero-knowledge encryption — security model where service providers cannot access, decrypt, or view user data because encryption and decryption occur exclusively on client devices using keys never shared with servers. Zero-knowledge architecture ensures providers have "zero knowledge" of user data content, protecting privacy even if servers are compromised or compelled to provide data. Users control encryption keys, typically derived from master passwords unknown to providers.