Next: , Previous: , Up: Main Menu   [Contents][Index]


4 Algorithms

The crypto backends support a variety of algorithms used in public key cryptography.2 The following sections list the identifiers used to denote such an algorithm.


Footnotes

(2)

Some engines also provide symmetric only encryption; see the description of the encryption function on how to use this.