Acquiring a Cryptographic Context and Generating Keys

This section includes: