The "Crypto" module allows performing cryptographic operations: encryption and decryption of data, generation of private and public keys, generation and verification of an electronic digital signature.
In most cryptographic business processes we have cryptographic hardware acceleration built-in so you can get all benefits if you running your application on supported hardware (AES-NI)
Computing Resource Limits
Due to computing resource limitations for applications with free and low-end subscriptions, there is a chance that computing-hungry operations like Generate RSA Key with 4096+ key length will lead to a timeout or very long time waiting. The same limitations may occur with low-level hardware if you are self-hosting your server applications.