Available Crypto Scenarios and Use Cases

  All in One  
Symmetric Encryption Symmetric String Encryption (password based) ✔
Symmetric String Encryption (key based) ✔
Symmetric File Encryption ✔
 
Asymmetric Encryption / Public Key Cryptography Asymmetric String Encryption ✔  
Key Storage    
Hashing String Hash ✔  
Crypto Provider Setup    
Digital Signatures String Signing ✔