Security and Cryptographic Standards
Layer
Technology
Description
Key Exchange
ECDH (secp256k1)
Used for stealth address generation
Encryption
AES-GCM (256-bit)
Used by Lit Protocol for file encryption
Access Control
Wallet-based signature gating
Only authorized wallets can decrypt data
Hashing
Keccak256
Used for address derivation and file key mapping
Storage
Lighthouse / IPFS
Decentralized, immutable storage layer
All cryptographic functions are executed client-side, ensuring that no secret ever leaves the user’s browser.
Last updated
