Key Encryption Algorithm
Last updated
Last updated
Unloqen employs a robust encryption algorithm to secure private keys using Shamir-Secret-Sharing (SSS) and Elliptic Curve Cryptography (ECC). This algorithm ensures that private keys are divided into parts and encrypted with a set of operator keys derived from the user's socials. Let's dive into the encryption method step by step:
To begin, Unloqen divides the user's private keys into multiple parts using . This process breaks down the private keys into smaller, independent components, enhancing security and resilience against attacks.
Unloqen utilizes to generate unique and non-guessable operator keys derived from the user's socials. By leveraging the mathematical properties of elliptic curves, Unloqen creates a set of operator keys that are cryptographically secure and tied to the user's social identifiers.
Each part of the user's private keys is encrypted separately using one of the operator keys generated from the user's socials. Unloqen ensures that each part of the private keys is encrypted with a distinct operator key derived from a specific social identifier. This ensures that decryption of the private keys requires possession of the corresponding social identifier.
Unloqen establishes a threshold value based on the number of operator keys required to decrypt the private keys. The threshold is determined by a formula that ensures the user needs to prove ownership of the majority of their socials to retrieve their private keys. This threshold mechanism enhances security by requiring authentication across multiple social identifiers, mitigating the risk of data loss even if a subset of socials is compromised.
Unloqen's Key Encryption Algorithm combines the strength of Shamir-Secret-Sharing (SSS) and Elliptic Curve Cryptography (ECC) to safeguard private keys with a multi-layered security approach. By dividing private keys into parts, encrypting them with operator keys derived from social identifiers, and setting a threshold for key retrieval, Unloqen ensures robust protection against unauthorized access while offering resilience against potential compromises. This encryption method provides users with confidence in the security and integrity of their assets and data within the Unloqen platform.