package privacy import ( "context" "crypto/aes" "crypto/cipher" "crypto/rand" "fmt" "io" ) // Tokenizer handles PII tokenization and encryption type Tokenizer struct { key []byte } // NewTokenizer creates a new tokenizer func NewTokenizer(key []byte) (*Tokenizer, error) { if len(key) != 32 { return nil, fmt.Errorf("key must be 32 bytes") } return &Tokenizer{key: key}, nil } // Encrypt encrypts sensitive data func (t *Tokenizer) Encrypt(ctx context.Context, plaintext []byte) ([]byte, error) { block, err := aes.NewCipher(t.key) if err != nil { return nil, fmt.Errorf("failed to create cipher: %w", err) } gcm, err := cipher.NewGCM(block) if err != nil { return nil, fmt.Errorf("failed to create GCM: %w", err) } nonce := make([]byte, gcm.NonceSize()) if _, err := io.ReadFull(rand.Reader, nonce); err != nil { return nil, fmt.Errorf("failed to generate nonce: %w", err) } ciphertext := gcm.Seal(nonce, nonce, plaintext, nil) return ciphertext, nil } // Decrypt decrypts sensitive data func (t *Tokenizer) Decrypt(ctx context.Context, ciphertext []byte) ([]byte, error) { block, err := aes.NewCipher(t.key) if err != nil { return nil, fmt.Errorf("failed to create cipher: %w", err) } gcm, err := cipher.NewGCM(block) if err != nil { return nil, fmt.Errorf("failed to create GCM: %w", err) } nonceSize := gcm.NonceSize() if len(ciphertext) < nonceSize { return nil, fmt.Errorf("ciphertext too short") } nonce, ciphertext := ciphertext[:nonceSize], ciphertext[nonceSize:] plaintext, err := gcm.Open(nil, nonce, ciphertext, nil) if err != nil { return nil, fmt.Errorf("failed to decrypt: %w", err) } return plaintext, nil } // Tokenize creates a token for PII func (t *Tokenizer) Tokenize(ctx context.Context, pii string) (string, error) { encrypted, err := t.Encrypt(ctx, []byte(pii)) if err != nil { return "", err } // Return base64 encoded token return fmt.Sprintf("tok_%x", encrypted), nil }