Comprehensive guidance for implementing cryptographic operations securely, covering encryption algorithms, password hashing, TLS, and key management.
| Algorithm | Type | Key Size | Use Case | Status |
| AES-256-GCM | Symmetric | 256 bits | Data encryption | ✅ Recommended | | ChaCha20-Poly1305 | Symmetric | 256 bits | Data encryption (mobile) | ✅ Recommended | | RSA-OAEP | Asymmetric | 2048+ bits | Key exchange | ✅ Recommended | | ECDH (P-256) | Asymmetric | 256 bits | Key agreement | ✅ Recommended |
Comprehensive cryptography guidance covering encryption algorithms, password hashing, TLS configuration, key management, and post-quantum considerations. Use when implementing encryption, choosing hashing algorithms, configuring TLS/SSL, managing cryptographic keys, or reviewing cryptographic implementations. Source: melodic-software/claude-code-plugins.