Core Technology
The cryptographic primitives and methodologies that power Privault's absolute security guarantees.
AES-256-GCM Implementation
Our encryption standard uses Advanced Encryption Standard (AES) with 256-bit keys operated in Galois/Counter Mode (GCM). This provides both confidentiality and data origin authentication (integrity).
PBKDF2 Key Derivation
Master Passwords are never used directly. They are stretched via Password-Based Key Derivation Function 2 (PBKDF2) using SHA-256 with 100,000 iterations to make brute-force attacks computationally infeasible.
Secure Entropy Generation
All random numbers, salts, and initialization vectors (IVs) are generated using the Web Crypto API's cryptographically secure pseudo-random number generator (CSPRNG), ensuring true entropy.