Available Crypto Scenarios and Use Cases
| All in One | ||
|---|---|---|
| Symmetric Encryption | Symmetric String Encryption (password based) ✔ Symmetric String Encryption (key based) ✔ Symmetric File Encryption ✔ |
|
| Asymmetric Encryption / Public Key Cryptography | Asymmetric String Encryption ✔ | |
| Key Storage | ||
| Hashing | String Hash ✔ | |
| Crypto Provider Setup | ||
| Digital Signatures | String Signing ✔ |