Various operating procedures are shown below.

  • Key pair making procedure
  • Destination setting procedure
  • Encryption procedure
  • Decryption procedure
  • Backup procedure of the setting data