Available Crypto Scenarios and Use Cases

  All in One
Symmetric Encryption Symmetric String Encryption (password based) ✔
Symmetric String Encryption (key based) ✔
Symmetric File Encryption ✔
Asymmetric Encryption / Public Key Cryptography Asymmetric String Encryption ✔
Key Storage Asymmetric Key Storage ✔
Hashing String Hash ✔
Digital Signatures String Signing ✔