Available Crypto Scenarios and Use Cases
All in One | |
---|---|
Symmetric Encryption | Symmetric String Encryption (password based) ✔ Symmetric String Encryption (key based) ✔ Symmetric File Encryption ✔ |
Asymmetric Encryption / Public Key Cryptography | Asymmetric String Encryption ✔ |
Key Storage | Asymmetric Key Storage ✔ |
Hashing | String Hash ✔ |
Digital Signatures | String Signing ✔ |