Security and Cryptographic Standards

Layer
Technology
Description

Key Exchange

ECDH (secp256k1)

Used for stealth address generation

Encryption

AES-GCM (256-bit)

Used by Lit Protocol for file encryption

Access Control

Wallet-based signature gating

Only authorized wallets can decrypt data

Hashing

Keccak256

Used for address derivation and file key mapping

Storage

Lighthouse / IPFS

Decentralized, immutable storage layer

All cryptographic functions are executed client-side, ensuring that no secret ever leaves the user’s browser.

Last updated