Encryption Process
1. Key Generation: Encryption keys are derived from secure environment variables using SHA-256 hashing
2. Initialization Vector (IV): Each encryption operation uses a unique, randomly generated 16-byte IV
3. Authentication Tag: GCM mode provides built-in authentication to detect tampering
4. Storage Format: Encrypted data is stored in the format: IV:encryptedData:authTag