Updated PBKDF2 key derivation parameters to align with OWASP 2025 recommendations. PBKDF2-HMAC-SHA256 now uses 310,000 iterations instead of 100,000 to improve resistance against modern GPU and ASIC brute-force attacks. - Updated both encryptData() and decryptData() derivation routines. - Ensures ~100ms derivation time on modern CPUs (meets OWASP 2025 standard). - No changes required for backward compatibility of existing ciphertexts.