Available Crypto Scenarios and Use Cases
All in One | Easy Object oriented | |
---|---|---|
Symmetric Encryption | String Encryption ✔ | |
Asymmetric Encryption / Public Key Cryptography | ||
Key Storage | ||
Hashing | N/A | |
Crypto Provider Setup | ||
Digital Signatures | String signing |