Crypto

The Cryptography module provides business processes for implementing encryption, decryption, digital signing and etc. algorithms into your application.

Business processes

AES encryption and decryption: CBC and ECB modes

  • Crypto: Encrypt AES-CBC

  • Crypto: Decrypt AES-CBC

  • Crypto: Encrypt AES- ECB

  • Crypto: Decrypt AES- ECB

RSA encryption and decryption

  • Crypto: Encrypt RSA

  • Crypto: Decrypt RSA

Electronic signature and signature verification

  • Crypto: RSA Sign (MD5)

  • Crypto: RSA Sign (SHA1)

  • Crypto: RSA Sign (SHA256)

  • Crypto: RSA Sign (SHA512)

  • Crypto: RSA Verify Signature (MD5)

  • Crypto: RSA Verify Signature (SHA1)

  • Crypto: RSA Verify Signature (SHA256)

  • Crypto: RSA Verify Signature (SHA512)

Generate RSA private and public keys

  • Crypto: Generate RSA key

Hardware Acceleration

In most cryptographic business processes we have cryptographic hardware acceleration built-in so you can get all benefits if you running your application on supported hardware (AES-NI)

Computing Resource Limits

Due to computing resource limitations for applications with free and low-end subscriptions, there is a chance that computing-hungry operations like Generate RSA Key with 4096+ key length will lead to a timeout or very long time waiting. The same limitations may occur with low-level hardware if you are self-hosting your server applications.