The use of encryption is becoming increasingly common as a means to keep information secure. We use standard symmetric and asymmetric algorithms in our cryptographic library software.
Using widely available, well-known and standardised algorithms it is relatively easy to implement cryptographic functions in software. An often overlooked part of developing cryptographic systems is that of managing cryptographic keys, both on local devices and in centralised key management systems.
Often used in conjunction with or part of key management systems, authentication protocols enable cryptographic verification of users and end-devices.