Header and Body 2

Problem Addressed

Modern cryptography offers numerous schemes for the protection of various types of data, at-rest and in-transit, across a broad set of applications. Some major impediments to the adoption and use of cryptographic protections in applications is the lack of easy-to-use interface and resource-laden key management that could allow users to enact desired protections through intuitive means. Furthermore, it is desirable for operators to employ cryptographic protections to control the conditions (such as location) under which receivers can access communication data.