Usage: Cryptography Operations
General crypto operations:
- generate a new random AES key
- encrypt a file with a given AES key
- decrypt a file with a given AES key
- encrypt an AES key with a set of public keys
- decrypt an AES key
- encrypt a file with a given encrypted AES key
- decrypt a file with a given encrypted AES key
- generate an AES key and encrypt it with a set of public keys
- regenerate the encrypted versions of an AES key