Security you can verify
Every cryptographic claim on this page is auditable in the open-source code. Here is exactly what StenVault does — and why.
Zero-knowledge architecture
The server only ever sees encrypted bytes. Filenames, file content, and encryption keys stay on your device.
Server stores only ciphertext
File content and filenames are encrypted on your device before they reach our servers. We never hold plaintext or decryption keys.
Passwords never transmitted
Login uses the OPAQUE protocol (RFC 9807). Your password never leaves your device, and no password hash is stored on the server.
Open source under GPL-3.0
The full client is public on GitHub. Every cryptographic claim on this page is verifiable in the source code.
Post-quantum cryptography, explained
NIST defines five security levels for post-quantum algorithms. Most implementations choose Level 1, equivalent to AES-128. StenVault uses Level 3, equivalent to AES-192, in a hybrid construction with X25519.
| Algorithm | NIST Level | Equivalent strength |
|---|---|---|
| ML-KEM-512 / Kyber-512 | Level 1 | ≈ AES-128 |
| ML-KEM-768 | Level 3 | ≈ AES-192 |
| ML-KEM-1024 | Level 5 | ≈ AES-256 |
StenVault combines ML-KEM-768 with X25519 in a true hybrid KEM. An attacker must break both to compromise your files. If ML-KEM-768 has an undiscovered weakness, X25519 still protects you. If X25519 falls to quantum computers, ML-KEM-768 still protects you. No single point of cryptographic failure.
The full cryptographic stack
Standardized, peer-reviewed primitives. Every layer uses a NIST- or IETF-standardized algorithm.
| Primitive | Classical | Post-quantum | Purpose |
|---|---|---|---|
| Key encapsulation | X25519 ECDH | ML-KEM-768 (FIPS 203) | Per-file key wrapping |
| Digital signatures | Ed25519 | ML-DSA-65 (FIPS 204) | File integrity |
| Password auth | OPAQUE (RFC 9807) | — | Zero-knowledge login |
| File encryption | AES-256-GCM | — | Content encryption |
| Key derivation | Argon2id (47 MiB, t=1, p=1) | — | Password → KEK |
| File format | CVEF v1.4 (container v2) | — | AAD-bound envelope |
Want every cryptographic detail?
The security whitepaper documents algorithms, parameters, data flows, and design rationale with direct citations to the source code.
Verify it in the source
Every claim on this page is backed by a file in the public repository.
Frequently asked
What is hybrid post-quantum cryptography?
Why Level 3 and not Level 5?
Has StenVault been audited?
What happens if a post-quantum algorithm is broken?
Is AES-256 quantum-safe?
What is harvest-now-decrypt-later?
Try it yourself
5 GB free, post-quantum encrypted from day one. No credit card.
Start free