ArweaveKit Docs
  • ArweaveKit
    • Introduction
  • 🔐Wallets
    • Introduction to Wallets
    • Create Wallet
    • Get Wallet Address
    • Get Wallet Balance
    • Wallet Plugins
  • 💳ARWEAVE WALLET KIT
    • Introduction to Arweave Wallet Kit
    • Setup
    • Connect Button
    • Hooks
    • Customization
  • 🏦Transactions
    • Introduction to Transactions
    • Create Transaction
    • Sign Transaction
    • Post Transaction
    • Get Transaction Status
    • Get Transaction
    • Create and Post Transaction with Othent
    • Transaction Plugins
  • 📄SMART CONTRACTS
    • Introduction to Smart Contracts
    • Create Contract
    • Write Contract
    • Read Contract State
    • View Contract State
    • Write Contract with Othent
    • Read Contract with Othent
    • Smart Contract Plugins
  • ✅AUTH
    • Introduction to Auth
    • Connect
    • Disconnect
    • Get Active Address
    • Get Permissions
    • Get Wallet Names
    • Get All Addresses
    • Get Active Public Key
    • Is Installed
    • Log In with Othent
    • Log Out with Othent
    • Get User Details with Othent
    • Auth Plugins
  • 🔐Encryption
    • Introduction to Encryption
    • Encrypt Data with AES
    • Decrypt Data with AES
    • Encrypt AES Key with RSA
    • Decrypt AES Key with RSA
    • Encryption Plugins
  • 🌐GRAPHQL
    • Introduction to GraphQL
    • Query All Arweave Transactions
    • Query Arweave Data
    • Query Arweave Transactions
    • GraphQL Plugins
  • 🗺️RoadMap
    • Features
  • 📘REFERENCES
    • ArweaveKit in Browser Environments
  • 🛠️SUPPORTING TOOLS
    • Arweave StarterKit
Powered by GitBook
On this page
  • Need for encryption
  • How does encryption work?
  • Encryption from a development perspective
  • Tools used
  • Encryption based functions

Was this helpful?

  1. Encryption

Introduction to Encryption

Introduction to encryption and decryption on Arweave

PreviousAuth PluginsNextEncrypt Data with AES

Last updated 1 year ago

Was this helpful?

Need for encryption

Arweave has brought forth the ability to "permanently" store data at a low cost leveraging the benefits of decentralization.

Arising from the benefits of immutability and openness, however, is a need to ensure adequate data protection for sensitive and private information.

With the help of encryption and decryption features, users can seek the benefits of permanent data storage and rest assured that their data is confidential and secure.

How does encryption work?

On a high level, data that must be secured, is locked cryptographically and the key for unlocking it is only provided to the user that encrypts this information. This ensures that only the user encrypting the data can securely decrypt and access it again.

Encryption from a development perspective

Developers can create user interfaces for users to securely encrypt and decrypt their data easily.

It is important that developers handle the process with end-to-end encryption, where in no one (including the developers), except the end user has access to the keys.

Tools used

The functions associated with smart contracts leverage the following tools:

Encryption based functions

In this section, we will look at the following features:

  • encrypt data with AES

  • decrypt data with AES

  • encrypt AES key with RSA

  • decrypt AES key with RSA

🔐
Web Crypto API
Arweave Wallet (Window Object)