Security & Encryption Glossary

Plain-language explanations of the security concepts behind Vaulted.

AES-256-GCM

AES-256-GCM is a symmetric encryption algorithm that combines the Advanced Encryption Standard with a 256-bit key and Galois/Counter Mode, providing both data confidentiality and built-in integrity verification in a single operation.

Ciphertext

Ciphertext is the encrypted output of a cryptographic algorithm — a scrambled representation of the original data that is unreadable without the corresponding decryption key.

Client-Side Encryption

Client-side encryption is the practice of encrypting data on the user's device — typically in a browser or native app — before transmitting it to a server, ensuring the server only ever receives and stores encrypted data.

Credential Management

Credential management is the set of policies, processes, and tools used to securely handle the full lifecycle of access credentials — including creation, secure storage, controlled sharing, regular rotation, and timely revocation.

Data Breach

A data breach is a security incident in which sensitive, protected, or confidential data is accessed, disclosed, or stolen by an unauthorized party, whether through hacking, insider threat, misconfiguration, or accidental exposure.

Encryption at Rest

Encryption at rest is the practice of storing data in encrypted form on persistent storage — such as disks, databases, or backup media — so that the data remains protected even if the storage medium is compromised.

Encryption in Transit

Encryption in transit is the practice of encrypting data as it travels between two systems across a network, typically implemented via TLS (Transport Layer Security) or its predecessor SSL, to prevent eavesdropping and tampering.

End-to-End Encryption

End-to-end encryption (E2EE) is a communication method where data is encrypted on the sender's device and can only be decrypted on the recipient's device, ensuring that no intermediary — including the service provider — can access the plaintext content.

Ephemeral Secrets

Ephemeral secrets are sensitive data items — such as passwords, tokens, or keys — that are intentionally designed to exist for a limited time period or number of accesses before being permanently and irrecoverably destroyed.

Key Derivation

Key derivation is the process of transforming a source value — typically a password, passphrase, or shared secret — into one or more cryptographic keys using a deterministic algorithm designed to produce high-entropy key material.

PBKDF2

PBKDF2 (Password-Based Key Derivation Function 2) is a key derivation algorithm defined in RFC 8018 that applies a pseudorandom function — typically HMAC-SHA-256 — iteratively to a password and salt to produce a derived key that is computationally expensive to brute-force.

Plaintext

Plaintext is data in its original, unencrypted, human-readable form. In cryptography, it refers to the input to an encryption algorithm or the output of a decryption algorithm.

Principle of Least Privilege

The principle of least privilege is a security concept that states every user, process, or system should be granted only the minimum level of access — and for the minimum amount of time — necessary to perform its authorized function.

Secret Sharing

Secret sharing, in the context of credential management, is the practice of transmitting sensitive information — such as passwords, API keys, or private keys — between parties through a channel designed to minimize exposure, limit persistence, and prevent unauthorized access.

Secrets Management

Secrets management is the discipline of securely storing, distributing, rotating, and auditing sensitive credentials — such as API keys, passwords, tokens, certificates, and encryption keys — across applications, infrastructure, and teams.

Self-Destructing Messages

Self-destructing messages are messages or shared data designed to be automatically and permanently deleted after being accessed a specified number of times or after a defined time period expires.

Symmetric Encryption

Symmetric encryption is a cryptographic method where the same secret key is used for both encryption and decryption. Both the sender and recipient must possess the identical key to encrypt and decrypt data.

URL Fragment

A URL fragment is the part of a URL that appears after the hash symbol (#). Per RFC 3986, browsers process fragments client-side only and never include them in HTTP requests sent to the server.

Web Crypto API

The Web Crypto API is a W3C standard that provides a JavaScript interface to a suite of cryptographic primitives — including encryption, decryption, key generation, hashing, and signing — implemented natively in the browser.

Zero-Knowledge Architecture

Zero-knowledge architecture is a system design where the service provider has no ability to access, read, or decrypt the data it stores on behalf of users, because all encryption and decryption operations happen on the client side.