Core Technology

The cryptographic primitives and methodologies that power Privault's absolute security guarantees.

AES-256-GCM Implementation

Our encryption standard uses Advanced Encryption Standard (AES) with 256-bit keys operated in Galois/Counter Mode (GCM). This provides both confidentiality and data origin authentication (integrity).

PBKDF2 Key Derivation

Master Passwords are never used directly. They are stretched via Password-Based Key Derivation Function 2 (PBKDF2) using SHA-256 with 100,000 iterations to make brute-force attacks computationally infeasible.

Secure Entropy Generation

All random numbers, salts, and initialization vectors (IVs) are generated using the Web Crypto API's cryptographically secure pseudo-random number generator (CSPRNG), ensuring true entropy.