AES-256-GCM · PBKDF2-SHA256 · 600k iterations
Use a strong, unique key. The same key is required for decryption.
AES-256-GCM | Random 128-bit salt & 96-bit IV per operation
PBKDF2 with SHA-256 & 600,000 iterations for key derivation
Copy the encrypted Base64 string from above and use these ready-to-run
snippets to decrypt it server-side or in any client application.
[salt 16B] + [iv 12B] + [ciphertext + GCM-tag 16B]AES-256-GCM · KDF: PBKDF2-HMAC-SHA256 · Iterations: 600,000