It stores security certificates
It manages available cryptographic algorithms
It provides cryptographic operations for digital signatures and message digests
It can hold user private key
It generates data objects?keystores or certificates?that encapsulate cryptographic keys,
which can be used in a cryptographic operation, in a secure fashion
It extracts and checks user password transmitted via secure channels
It generates the cryptographic material?keys required for cryptographic operations
|