data-encryption▌
aj-geddes/useful-ai-prompts · updated Apr 8, 2026
Implement robust encryption strategies for protecting sensitive data at rest and in transit using industry-standard cryptographic algorithms and key management practices.
Data Encryption
Table of Contents
Overview
Implement robust encryption strategies for protecting sensitive data at rest and in transit using industry-standard cryptographic algorithms and key management practices.
When to Use
- Sensitive data storage
- Database encryption
- File encryption
- Communication security
- Compliance requirements (GDPR, HIPAA, PCI-DSS)
- Password storage
- End-to-end encryption
Quick Start
Minimal working example:
// encryption-service.js
const crypto = require("crypto");
const fs = require("fs").promises;
class EncryptionService {
constructor() {
// AES-256-GCM for symmetric encryption
this.algorithm = "aes-256-gcm";
this.keyLength = 32; // 256 bits
this.ivLength = 16; // 128 bits
this.saltLength = 64;
this.tagLength = 16;
}
/**
* Generate a cryptographically secure random key
*/
generateKey() {
return crypto.randomBytes(this.keyLength);
}
/**
* Derive a key from a password using PBKDF2
*/
async deriveKey(password, salt = null) {
// ... (see reference guides for full implementation)
Reference Guides
Detailed implementations in the references/ directory:
| Guide | Contents |
|---|---|
| Node.js Encryption Library | Node.js Encryption Library |
| Python Cryptography Implementation | Python Cryptography Implementation |
| Database Encryption (PostgreSQL) | Database Encryption (PostgreSQL) |
| TLS/SSL Configuration | TLS/SSL Configuration |
Best Practices
✅ DO
- Use AES-256-GCM for symmetric encryption
- Use RSA-4096 or ECC for asymmetric encryption
- Implement proper key rotation
- Use secure key storage (HSM, KMS)
- Salt and hash passwords
- Use TLS 1.2+ for transit encryption
- Implement key derivation (PBKDF2, Argon2)
- Use authenticated encryption
❌ DON'T
- Roll your own crypto
- Store keys in code
- Use ECB mode
- Use MD5 or SHA1
- Reuse IVs/nonces
- Use weak key lengths
- Skip authentication tags
Discussion
Product Hunt–style comments (not star reviews)- No comments yet — start the thread.
Ratings
4.7★★★★★30 reviews- ★★★★★Dev Srinivasan· Dec 20, 2024
Useful defaults in data-encryption — fewer surprises than typical one-off scripts, and it plays nicely with `npx skills` flows.
- ★★★★★Chaitanya Patil· Dec 12, 2024
data-encryption has been reliable in day-to-day use. Documentation quality is above average for community skills.
- ★★★★★Charlotte Harris· Dec 4, 2024
We added data-encryption from the explainx registry; install was straightforward and the SKILL.md answered most questions upfront.
- ★★★★★Kabir Khanna· Nov 27, 2024
data-encryption fits our agent workflows well — practical, well scoped, and easy to wire into existing repos.
- ★★★★★Soo Yang· Nov 23, 2024
Keeps context tight: data-encryption is the kind of skill you can hand to a new teammate without a long onboarding doc.
- ★★★★★Charlotte Martin· Nov 11, 2024
I recommend data-encryption for anyone iterating fast on agent tooling; clear intent and a small, reviewable surface area.
- ★★★★★Piyush G· Nov 3, 2024
Solid pick for teams standardizing on skills: data-encryption is focused, and the summary matches what you get after install.
- ★★★★★Shikha Mishra· Oct 22, 2024
We added data-encryption from the explainx registry; install was straightforward and the SKILL.md answered most questions upfront.
- ★★★★★Dev Singh· Oct 18, 2024
Registry listing for data-encryption matched our evaluation — installs cleanly and behaves as described in the markdown.
- ★★★★★Emma Rao· Oct 14, 2024
data-encryption has been reliable in day-to-day use. Documentation quality is above average for community skills.
showing 1-10 of 30