Crypto
Last updated
Last updated
The "Crypto" module allows performing cryptographic operations: encryption and decryption of data, generation of private and public keys, generation and verification of an electronic digital signature.
Additional settings are not required.
Crypto: Encrypt AES-CBC
Crypto: Decrypt AES-CBC
Crypto: Encrypt AES- ECB
Crypto: Decrypt AES- ECB
Crypto: Encrypt RSA
Crypto: Decrypt RSA
Crypto: RSA Sign (MD5)
Crypto: RSA Sign (SHA1)
Crypto: RSA Sign (SHA256)
Crypto: RSA Sign (SHA512)
Crypto: RSA Verify Signature (MD5)
Crypto: RSA Verify Signature (SHA1)
Crypto: RSA Verify Signature (SHA256)
Crypto: RSA Verify Signature (SHA512)
Crypto: Generate RSA key
Hardware Acceleration
In most cryptographic business processes we have cryptographic hardware acceleration built-in so you can get all benefits if you running your application on supported hardware (AES-NI)
Computing Resource Limits
Due to computing resource limitations for applications with free and low-end subscriptions, there is a chance that computing-hungry operations like Generate RSA Key with 4096+ key length will lead to a timeout or very long time waiting. The same limitations may occur with low-level hardware if you are self-hosting your server applications.