20.6 Summary Now we have walked through examples on how to perform symmetric encryption, password-based encryption, public key encryption, and digital signature tasks using the Bouncy Castle, Phaos, NTRU, and IAIK toolkits. I have tried to make those example applications easy to understand. The goal here is to illustrate API usage rather than to provide industry-strength reusable code. Now, it is your turn to develop real-world, highly secure mobile applications! |