Skip to main content

Security That's Actually Secure

Quantum-ready encryption. Zero-knowledge architecture. Audited by experts.

Security That's Actually Secure

We use NIST-standardized post-quantum cryptography. Your data stays secure for decades.

AES-256

File encryption standard

Kyber-1024

Post-quantum key exchange

Argon2id

Password hashing

99.9%

Uptime SLA

Our Security Architecture

Client-Side Encryption

All files are encrypted on your device before upload using AES-256-GCM. Your encryption keys are derived from your password using Argon2id (64MB memory, 3 iterations) and never leave your device.

Password → Argon2id → Master Key → HKDF → File Keys
Each file encrypted with unique 256-bit key
IV: 96-bit random nonce per file
Auth: 128-bit GCM authentication tag

Post-Quantum Cryptography

We use NIST-standardized post-quantum algorithms to protect against future quantum computing threats:

  • Kyber-1024 (ML-KEM)

    NIST FIPS 203 - Key encapsulation mechanism for quantum-safe key exchange

  • Dilithium5 (ML-DSA)

    NIST FIPS 204 - Digital signatures for long-term data integrity

  • Hybrid Approach

    Combines classical (X25519, Ed25519) with post-quantum for defense-in-depth

Security Audits

RacterVault undergoes regular third-party security audits:

Cryptography Audit

NCC Group - Annual

Comprehensive review of encryption implementation and key management

Penetration Testing

Trail of Bits - Bi-annual

Infrastructure and application security assessment

Experience True Zero-Knowledge Security

Get Started Free