BitCrypt employs multiple layers of cryptographic protection to ensure your data remains absolutely secure. Our encryption implementation uses industry-standard algorithms with additional security hardening measures.
Advanced Encryption Standard with 256-bit keys - the same encryption used by governments and militaries worldwide. This provides 2^256 possible combinations, making brute force attacks computationally impossible.
Password-Based Key Derivation Function 2 with configurable iterations. This process deliberately slows down password cracking attempts by requiring significant computational resources for each guess.
Random 128-bit salt generated for each encryption operation. This prevents rainbow table attacks and ensures identical passwords produce different encrypted outputs.
Random 128-bit IV for each encryption. This ensures that encrypting the same data twice produces different ciphertexts, preventing pattern analysis attacks.
Algorithm:
AES-256-CBC (Cipher Block Chaining)Key Derivation:
PBKDF2 with SHA-256Salt Length:
128 bits (16 bytes)IV Length:
128 bits (16 bytes)Hash Function:
SHA-256 for password verificationBitCrypt is designed with a zero-knowledge architecture, meaning we literally cannot access your data even if we wanted to.
All encryption and decryption happens on your device. Your password never leaves your browser, and your data is encrypted before transmission.
Only a SHA-256 hash of your password is transmitted to verify identity. This hash cannot be reversed to recover your original password.
Your data is stored in our database in fully encrypted form. Without your password, the data is indistinguishable from random noise.
Download encrypted backups of your data anytime. These files can be decrypted using our offline decryption tool.
Understanding how your data is protected:
Use a complex password with mixed characters, numbers, and symbols. Longer passwords provide exponentially better security.
Your password is held in browser memory only during active sessions. It's immediately cleared when you end your session.
We cannot recover lost passwords - this is a security feature, not a limitation. Always keep secure backups of important passwords.
Please read and understand these important points before using BitCrypt:
For security researchers and technical users:
BitCrypt's security claims are fully verifiable by anyone with programming knowledge. We believe in transparency through code inspection.
All encryption logic is implemented in JavaScript and executed directly in your browser. View the source code by right-clicking on any page and selecting "View Page Source" or pressing F12 to open developer tools.
Developers can examine the JavaScript functions encryptContent()
and decryptContent()
to confirm that all cryptographic operations occur locally in your browser before any data transmission.
Use browser developer tools (Network tab) to monitor all communication with our servers. You'll see that only encrypted data and password hashes are transmitted - never your plain text data or actual passwords.
Technical users can verify our implementation of AES-256, PBKDF2, salt generation, and IV creation by examining the JavaScript source code. All cryptographic operations use the well-established CryptoJS library.
encryptContent(content, password)
- Encrypts your data before transmissiondecryptContent(encrypted, password)
- Decrypts data after retrievalhandleDecrypt()
- Manages password verification processsaveNotebooks()
- Handles encrypted data transmission to server💡 Trust Through Transparency: We encourage security-conscious users and developers to audit our code. This transparency is intentional - we want you to verify our security claims rather than simply trust them. BitCrypt's security is not based on obscurity, but on proven cryptographic standards that you can inspect and validate yourself.