Where do the encryption algorithms come in to play? In flight or at rest? What threat vectors are you hardening against?
Where do the encryption algorithms come in to play? In flight or at rest? What threat vectors are you hardening against?