Available Crypto Scenarios and Use Cases

  All in One Easy Object oriented
Symmetric Encryption String Encryption ✔  
Asymmetric Encryption / Public Key Cryptography    
Key Storage    
Hashing   N/A
Crypto Provider Setup    
Digital Signatures String signing