End-to-end Encryption

Last modified Jun 19, 2022
End-to-end Encryption

A system with End-To-End Encryption is a communication system in which all data can be read and modified only by the conversation participants. Its working principle prevents a third party (telecom providers, internet providers, state actors, and even the service provider) from acquiring the cryptographic keys used to encrypt and decrypt the conversation.

In an End-To-End Encrypted system, messages are encrypted on the sender’s device and can be decrypted only by the intended recipient’s device.

In Locker, users’ passwords and personal information are secured by the AES-256-CBC Encryption algorithm, cryptographic hash functions, and the Password-based Key Derivation Function 2 algorithm. Every encryption key is locally created and managed on the user device; all encryption and decryption processes are likewise locally performed. The Locker servers transfer and store encrypted data only when there is a request to access the information.