Available Crypto Scenarios and Use Cases
| All in One | Easy Object oriented | |
|---|---|---|
| Symmetric Encryption | String Encryption ✔ | |
| Asymmetric Encryption / Public Key Cryptography | ||
| Key Storage | ||
| Hashing | N/A | |
| Crypto Provider Setup | ||
| Digital Signatures | String signing |
| All in One | Easy Object oriented | |
|---|---|---|
| Symmetric Encryption | String Encryption ✔ | |
| Asymmetric Encryption / Public Key Cryptography | ||
| Key Storage | ||
| Hashing | N/A | |
| Crypto Provider Setup | ||
| Digital Signatures | String signing |