Use Cases Data at rest Data in motion Data verification (signatures) Identity verification (PKI) Algorithms Symmetric Algorithms AES DES Blowfish Twofish Serpent Asymmetric Algorithms RSA DSA ECC