Cryptographic operations .cursorrules strategies