Principle
Selection of Cryptographic Algorithms
Choose a mature algorithm;
Select an algorithm for precipitation over time;
Choose an algorithm that is mathematically proven to be safe;
Select the algorithm that is widely used in the production environment;
Privacy
Avoid touching anything entered by the user;
The non-storage content entered by the user should become part of the key entropy to improve the key strength;
The user's data content is only visible to the user, and each access must be authenticated;
Obfuscate as much as possible to improve privacy by adding randomness;
Safety
In the time that the user can tolerate, the encryption time is extended through the algorithm to increase the attack cost of the adversary;
Security should be ensured through algorithms and encryption processes, and security enhancements by introducing third-party roles should be avoided, which may be a hidden danger in the long run;
Security design should start from this perspective: anyone can be an attacker of the system, and any link will have loopholes;
Stay Open
Any organization or individual can develop a new encryption process and submit it to the seedlist code repository;
Anyone can use it freely and store any small-sized content at will;
Product Form
Keep it simple;
Minimize the burden on users;
Do not rely on centralized servers;
Last updated