You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: www/pages/about.md
+52-52Lines changed: 52 additions & 52 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,35 +9,35 @@ permalink: /about/
9
9
10
10
IPCrypt is a simple, open specification that suggests methods for encrypting and obfuscating IP addresses. It offers both deterministic format-preserving and non-deterministic approaches that work with both IPv4 and IPv6 addresses.
11
11
12
-
This community effort was inspired by privacy concerns highlighted in [RFC6973](https://datatracker.ietf.org/doc/html/rfc6973) and [RFC7258](https://datatracker.ietf.org/doc/html/rfc7258) about pervasive monitoring and data collection. We aimed to help maintain the practical utility of IP addresses in network operations while addressing these privacy considerations.
12
+
This specification addresses concerns raised in [RFC7624](https://datatracker.ietf.org/doc/html/rfc7624) regarding confidentiality when sharing data with third parties, providing cryptographically sound techniques that enable data analysis while protecting user privacy from parties without key access.
13
13
14
-
## The Challenge We're Trying to Help With
14
+
## The Challenge We're Addressing
15
15
16
-
IP addresses are fundamental to network operations but present some privacy challenges:
16
+
IP addresses are personally identifiable information requiring protection, yet common techniques have fundamental limitations:
17
17
18
-
1.**Privacy Considerations**: IP addresses can potentially reveal information about users
19
-
2.**Regulatory Context**: Some jurisdictions consider IP addresses as personal data (e.g., GDPR)
20
-
3.**Research Limitations**: Difficulty sharing network data for research or analysis
21
-
4.**Service Provider Concerns**: Sharing raw IP addresses with external services raises privacy questions
22
-
5.**Varied Approaches**: Different organizations use different methods to protect IP addresses
18
+
1.**Truncation Problems**: Zeroing parts of addresses provides unpredictable privacy - a /24 mask may hide one user or thousands
19
+
2.**Hashing Limitations**: Produces non-reversible outputs unsuitable for operational tasks like abuse investigation
20
+
3.**Ad-hoc Schemes**: Often lack rigorous security analysis and cannot interoperate between systems
21
+
4.**Generic Encryption Issues**: Expands data unpredictably, breaks compatibility with network tools, operates too slowly for high-volume processing
22
+
5.**Regulatory Requirements**: GDPR and similar regulations require proper protection of IP addresses as personal data
23
23
24
-
IPCrypt tries to offer a simple, consistent approach to IP address encryption that anyone can implement.
24
+
IPCrypt resolves these conflicts through purpose-built cryptographic techniques designed for network-rate processing.
25
25
26
26
## Potential Benefits
27
27
28
28
### For Network Operators
29
29
30
-
-**Practical Functionality**: Use IP addresses for routing, logging, and analytics while considering privacy
31
-
-**Regulatory Considerations**: May help with data protection requirements by encrypting identifiers
32
-
-**Research Possibilities**: Share network data with researchers without exposing raw addresses
33
-
-**Common Approach**: Use a shared specification instead of creating custom solutions
30
+
-**Efficiency and Compactness**: All variants operate on exactly 128 bits, achieving single-block encryption speed
31
+
-**High Usage Limits**: Non-deterministic variants safely handle ~4 billion (nd) to ~18 quintillion (ndx) operations per key
32
+
-**Format Preservation**: Deterministic mode produces valid IP addresses that flow through existing infrastructure
33
+
-**Interoperability**: Identical results across implementations enable seamless data exchange
34
34
35
35
### For Privacy Advocates
36
36
37
-
-**User Privacy**: Help protect user information in logs and analytics
38
-
-**Reduced Tracking**: Non-deterministic modes can prevent correlation across datasets
39
-
-**Open Methods**: Clearly defined cryptographic approaches with known properties
40
-
-**Versatile Application**: Works with both IPv4 and IPv6 addresses
37
+
-**Protection Against Third Parties**: Prevents unauthorized access to user information without the encryption key
38
+
-**Correlation Attack Resistance**: Non-deterministic modes use random tweaks to hide patterns
<h1 class="text-4xl md:text-5xl font-bold mb-6">A Common Approach to IP Address Encryption</h1>
11
11
<p class="text-xl max-w-3xl mx-auto mb-8">
12
-
IPCrypt is a simple, open specification for encrypting and obfuscating IP addresses, balancing privacy considerations with practical network operations.
12
+
IPCrypt provides secure, efficient methods for encrypting IP addresses for privacy-preserving storage, logging, and analytics while enabling data analysis without exposing user information.
<h2 class="text-3xl font-bold mb-6 text-center">What is IPCrypt?</h2>
26
26
<p class="text-lg mb-6">
27
-
IPCrypt is a community-created specification that suggests methods for encrypting and obfuscating IP addresses. It aims to help network operators, researchers, and privacy advocates share or analyze data while considering address privacy.
27
+
IPCrypt is a simple, open specification that suggests methods for encrypting and obfuscating IP addresses. It offers both deterministic format-preserving and non-deterministic approaches that work with both IPv4 and IPv6 addresses.
28
28
</p>
29
29
<p class="text-lg mb-6">
30
-
The specification offers both deterministic format-preserving and non-deterministic approaches that work with both IPv4 and IPv6 addresses.
30
+
Unlike truncation that destroys data irreversibly and hashing that cannot be reversed, IPCrypt provides mathematically secure, reversible encryption designed for high-performance processing at network speeds.
31
31
</p>
32
32
<p class="text-lg mb-6">
33
33
<strong>Simplicity</strong> is a core value in IPCrypt's design. Rather than trying to create new cryptographic methods, we've used established standards that are well-understood and widely available, making it easier for anyone to implement.
0 commit comments