Strategy overview

  1. The vault-name and password entered by the user are the starting point of all encryption, abbreviated as inputs;

  2. The address of the user contract storage space is derived based on the inputs;

  3. The key to encrypt the Label is derived based on the inputs. The encryption of the label adopts the backward ratchet strategy, and the previous label will be part of the key derivation parameters of the latter label;

  4. The key to encrypt Content is based on inputs and labels, and a similar backward ratchet key push strategy based on labels will be used during this period;

  5. The user's permission to operate the storage contract is based on the signature; the verification key pair of the signature is derived based on the inputs;

Each of the above derivation processes will be described in detail later;

In the following derivation description, you will see that in the encryption process, RIPEMD160 SHA256 SHA512 KECCAK256 and Scrypt algorithms will be mixed; the purpose of this is only one: to infinitely increase the cost of brute force cracking by the adversary.

Last updated