Access your own Unique public and private keys or another party's public key.
Upload plain text for encryption or cypher text for decryption. You may also upload your own self generated public key.
Recover and download plain text from your encrypted data and messages. Download cypher text of your data.