Glossary of Technical Terms

Glossary

This glossary defines key terms used throughout the Cipher documentation.

  • AES (Advanced Encryption Standard): A widely used symmetric encryption algorithm. In Cipher, it is applied as a final encryption layer after polymorphic substitutions.

  • Asymmetric Encryption: A cryptographic method using a key pair—private and public—for encryption and decryption. Cipher uses elliptic curve cryptography to manage identities and derive shared secrets.

  • Cascade Substitution Logic: A process in Cipher where up to 20 layers of polymorphic substitutions are applied sequentially, each determined by the structured channel.

  • Channel (Structured): A unique string used in Cipher to define encryption rules. It is divided into a numeric left part (defining the substitution layers) and a character-based right part (used as entropy for substitutions).

  • Ciphertext: The output of the encryption process—unreadable data until decrypted with the correct keys and channel.

  • ECDH (Elliptic Curve Diffie-Hellman): A key exchange protocol that enables the derivation of a shared secret without transmitting the secret itself.

  • Key Pair: Composed of a private key (kept secret) and a public key (shared openly), used to establish secure communication.

  • Metadata-Free: A property of Cipher indicating no user data, usage logs, or session identifiers are stored or processed.

  • Polymorphic Substitution: A dynamic encryption transformation that changes with every input, channel, and key combination.

  • Private Key: The secret component of a key pair, used in Cipher as a personal identifier and as input for secure derivation of secrets.

  • Public Key: The openly shared component of a key pair, used to identify recipients and generate shared secrets.

  • Shared Secret: A hash derived from combining the sender’s private key and recipient’s public key (or vice versa), used to produce the AES key in a zero-knowledge fashion.

  • Stateless: Describes Cipher’s design—no sessions, no cookies, no retained history. Every action is performed in-memory only.

  • ZKP (Zero-Knowledge Proof): A method allowing one party to prove knowledge of a secret without revealing it. Cipher uses ZKP principles to securely derive AES keys.

  • .0fx File: Cipher’s encrypted file format used to export encrypted data, which can be reimported for decryption within the same environment.

Last updated