Available Crypto Scenarios and Use Cases
All in One | ||
---|---|---|
Symmetric Encryption | Symmetric String Encryption (password based) ✔ Symmetric String Encryption (key based) ✔ Symmetric File Encryption ✔ |
|
Asymmetric Encryption / Public Key Cryptography | Asymmetric String Encryption ✔ | |
Key Storage | ||
Hashing | String Hash ✔ | |
Crypto Provider Setup | ||
Digital Signatures | String Signing ✔ |