--- title: Cryptography description: An overview of the cryptography used in Veilid weight: 23 layout: subpage --- Strong, appropriate, cryptography choices are essential to the functioning of Veilid. Veilid provides applications guarantees about how data is handled on the wire and at rest. Cryptosystems were chosen that work well together and provide a balance of speed and cryptographic hardness. ### Current Cryptography Systems
Device-level Secret Storage
keyring-manager
Encrypted Key-Value Database
keyvaluedb
Distributed Hash Table Storage
Content-addressable Data Distribution
Everything is end-to-end encrypted
Data is encrypted at rest and on the wire
Your data is protected even if you lose your device