Available Crypto Scenarios and Use Cases
| All in One | |
|---|---|
| Symmetric Encryption | Symmetric String Encryption (password based) ✔ Symmetric String Encryption (key based) ✔ Symmetric File Encryption ✔ |
| Asymmetric Encryption / Public Key Cryptography | Asymmetric String Encryption ✔ |
| Key Storage | Asymmetric Key Storage ✔ |
| Hashing | String Hash ✔ |
| Digital Signatures | String Signing ✔ |