Local Data Encryption
Secure local storage using hardware-derived AES keys and authenticated encryption.
Overview
Process Flow
flowchart TD
A[First Run] --> B[Generate 32-byte AES Key<br>• Hardware RNG]
B --> C[Store in Secure Keychain / Keystore]
C --> D[Encrypt Data<br>• AES-256-GCM + Nonce 12 bytes]
D --> E[Store Encrypted Blob<br>• nonce + ciphertext + tag]
E --> F[Decrypt as Needed<br>• Reverse process using stored key]Cryptographic Summary
Component
Algorithm
Key Size
Storage Location
Purpose
Last updated