F-Secure Key data encryption (in a nutshell)

0 Kudos
(3,383 Views)

F-Secure Key data encryption (in a nutshell)

F-Secure Key uses the Advanced Encryption Standard (AES-256) algorithm in the CCM mode (CTR with CBC MAC) for encryption to protect your sensitive data. The security of the AES was carefully analyzed by many crypto experts prior to selecting it as a recommended algorithm for modern data encryption.

 

The master encryption key is derived from your master password using the Password-Based Key Derivation Function 2 (PBKDF2) algorithm specified in Public-Key Cryptography Standards (PKCS) #5. In PBKDF2, we use Hash-based Message Authentication Code (HMAC) SHA256, random salts and 20,000 of iterations. This makes it much more difficult to recover the keys through exhaustive search or dictionary attacks even for weaker passwords.

 

Each password record is individually encrypted using a unique and strong random encryption key. The record-specific keys are encrypted using a master encryption key which is derived from your master password using the PBKDF2 algorithm.

 

Your master password and the master encryption key are never stored anywhere. The encryption keys live only when you use the product. There is no way to recover your password or data if you forget the master password.

 

When we developed F-Secure Key, our guiding design principle was: "We don't need to know who you are. We just hope you like the product." Consequently, we respect the anonymity of F-Secure Key users. Also, we don't track you when you synchronize your data across devices.

 

The F-Secure Key servers are owned and operated by F-Secure within the European Union in compliance with Finnish law and applicable EU rules.

Contributors