Create a ticket
Sign in Sign up
Locker support Locker support

No results found.

Home Locker Whitepaper Security Fundamentals
Security Fundamentals

Encryption algorithms and protocols used in the development of Locker.

Two-secret Key Derivation

To ensure the keys stored on the Locker servers can be used only by their owners, Locker applies the two-secret key derivation in symmetric key generation for encryption and decryption of data stored on the servers.

Hash Function

A cryptographic hash function is an algorithm that maps data of an arbitrary size to a bit array of a fixed size.

Master Password

The Master Password is an important secret component in Locker’s Two-secret Key Derivation process, and is the only item a user needs to memorize for data encryption and decryption.

Encryption Keys

The other component of the Two-secret Key Derivation is the Encryption Keys, generated when a user registers a Locker account.

End-to-end Encryption

A system with End-To-End Encryption is a communication system in which all data can be read and modified only by the conversation participants.

Zero-knowledge Encryption

Zero-Knowledge Proof is a method for one party (the prover) to prove to another party (the verifier) that a statement of the prover is true without telling the verifier that statement.

AES-256-CBC Encryption

AES-256-CBC (Cipher Block Chaining), the algorithm used to encrypt Vault, is a standard cryptographic algorithm and is used by the US government and other government agencies worldwide.

Password-based Key Derivation Function 2

The PBKDF2 (Password-based Key Derivation Function 2) SHA-256 algorithm is for generating Encryption Keys from a user’s Master Password.

RSA Encryption

An RSA key pair consists of a Private Key and a Public Key. The RSA algorithm is often used for digital signature verification and key exchange problems.


The secret data storage or Vault is where all encrypted data of users is stored on the Locker servers. All of the Vault data cannot be decrypted or read without the Vault owner’s Master Password.

Cryptographically Secure Pseudorandom Number Generator

A pseudorandom number generator (PRNG) is an algorithm for generating a sequence of numbers whose properties approximate those of a sequence of random numbers.

Join Our Community